Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MV GOLDEN SCHULTE DETAILS.exe

Overview

General Information

Sample name:MV GOLDEN SCHULTE DETAILS.exe
Analysis ID:1576558
MD5:6f6b30df02a24ad8819384f41b743a8a
SHA1:c2bdbd4518c77544484d324fc39ce7f320e59fbc
SHA256:f75da861b7cbf08727ea95e5e6111db769b818deec9d0328decc37a8a08a608f
Tags:exeuser-julianmckein
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Username": "info@gzdled.com.tr", "Password": "Gozdeled1048", "Host": "mail.gzdled.com.tr", "Port": "587", "Token": "8043217727:AAHet_KMDJubZguJgq0Cp7yrQCzgcnbbXpU", "Chat_id": "6247294228", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3694364610.0000000005540000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
  • 0x4ae6b:$x1: In$J$ct0r
00000002.00000002.3691640862.0000000002DA8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x1491f:$a1: get_encryptedPassword
        • 0x14c0b:$a2: get_encryptedUsername
        • 0x1472b:$a3: get_timePasswordChanged
        • 0x14826:$a4: get_passwordField
        • 0x14935:$a5: set_encryptedPassword
        • 0x15fd0:$a7: get_logins
        • 0x15f33:$a10: KeyLoggerEventArgs
        • 0x15b9e:$a11: KeyLoggerEventArgsEventHandler
        Click to see the 15 entries
        SourceRuleDescriptionAuthorStrings
        0.2.MV GOLDEN SCHULTE DETAILS.exe.5540000.5.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
        • 0x4906b:$x1: In$J$ct0r
        0.2.MV GOLDEN SCHULTE DETAILS.exe.5540000.5.raw.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
        • 0x4ae6b:$x1: In$J$ct0r
        0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
        • 0x4906b:$x1: In$J$ct0r
        0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            Click to see the 40 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-17T09:02:05.534599+010028033053Unknown Traffic192.168.2.749704172.67.177.134443TCP
            2024-12-17T09:02:08.643772+010028033053Unknown Traffic192.168.2.749708172.67.177.134443TCP
            2024-12-17T09:02:17.935425+010028033053Unknown Traffic192.168.2.749727172.67.177.134443TCP
            2024-12-17T09:02:24.055204+010028033053Unknown Traffic192.168.2.749747172.67.177.134443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-17T09:02:01.336370+010028032742Potentially Bad Traffic192.168.2.749699193.122.6.16880TCP
            2024-12-17T09:02:03.898894+010028032742Potentially Bad Traffic192.168.2.749699193.122.6.16880TCP
            2024-12-17T09:02:07.023881+010028032742Potentially Bad Traffic192.168.2.749706193.122.6.16880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: MV GOLDEN SCHULTE DETAILS.exeAvira: detected
            Source: 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Username": "info@gzdled.com.tr", "Password": "Gozdeled1048", "Host": "mail.gzdled.com.tr", "Port": "587", "Token": "8043217727:AAHet_KMDJubZguJgq0Cp7yrQCzgcnbbXpU", "Chat_id": "6247294228", "Version": "5.1"}
            Source: MV GOLDEN SCHULTE DETAILS.exeVirustotal: Detection: 51%Perma Link
            Source: MV GOLDEN SCHULTE DETAILS.exeReversingLabs: Detection: 58%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: MV GOLDEN SCHULTE DETAILS.exeJoe Sandbox ML: detected

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.7:49703 version: TLS 1.0
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3695006740.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3691221952.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0114F1F6h2_2_0114F007
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0114FB80h2_2_0114F007
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h2_2_0114E528
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 06791A38h2_2_06791620
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067902F1h2_2_06790040
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 06791471h2_2_067911C0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679FD11h2_2_0679FA68
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679C8F1h2_2_0679C648
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679F8B9h2_2_0679F610
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 06791A38h2_2_06791610
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679D1A1h2_2_0679CEF8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679CD49h2_2_0679CAA0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679D5F9h2_2_0679D350
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679DA51h2_2_0679D7A8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679E301h2_2_0679E058
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679DEA9h2_2_0679DC00
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679B791h2_2_0679B4E8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679E759h2_2_0679E4B0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 06790751h2_2_067904A0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 06791011h2_2_06790D60
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679F009h2_2_0679ED60
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 06791A38h2_2_06791966
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679BBE9h2_2_0679B940
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679EBB1h2_2_0679E908
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 06790BB1h2_2_06790900
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679C499h2_2_0679C1F0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679F461h2_2_0679F1B8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 0679C041h2_2_0679BD98
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C8945h2_2_067C8608
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C5D19h2_2_067C5A70
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C58C1h2_2_067C5618
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_067C36CE
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C6171h2_2_067C5EC8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C6A21h2_2_067C6778
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C65C9h2_2_067C6320
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C6E79h2_2_067C6BD0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_067C33B8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]2_2_067C33AF
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C72FAh2_2_067C7050
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C02E9h2_2_067C0040
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C0B99h2_2_067C08F0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C7751h2_2_067C74A8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C0741h2_2_067C0498
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C8001h2_2_067C7D58
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C0FF1h2_2_067C0D48
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C7BA9h2_2_067C7900
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C8459h2_2_067C81B0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 4x nop then jmp 067C5441h2_2_067C5198

            Networking

            barindex
            Source: Yara matchFile source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPE
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49706 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49699 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49704 -> 172.67.177.134:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49708 -> 172.67.177.134:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49727 -> 172.67.177.134:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49747 -> 172.67.177.134:443
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.7:49703 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D6D000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747

            System Summary

            barindex
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.5540000.5.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.5540000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3005494.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3002c54.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
            Source: 00000000.00000002.3694364610.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects downloader injector Author: ditekSHen
            Source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2960, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2960, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2760, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2760, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 0_2_02D9A0F00_2_02D9A0F0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 0_2_02D9D3040_2_02D9D304
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 0_2_02D95E170_2_02D95E17
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 0_2_062A96800_2_062A9680
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_011461082_2_01146108
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114C1922_2_0114C192
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114F0072_2_0114F007
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114B3282_2_0114B328
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114C4702_2_0114C470
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_011467302_2_01146730
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114C7522_2_0114C752
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_011498582_2_01149858
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114BBD22_2_0114BBD2
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114CA322_2_0114CA32
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_01144AD92_2_01144AD9
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114BEB62_2_0114BEB6
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114E5172_2_0114E517
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114E5282_2_0114E528
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_011435722_2_01143572
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0114B4F22_2_0114B4F2
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_06797B702_2_06797B70
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067938702_2_06793870
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067984602_2_06798460
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067900402_2_06790040
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067911C02_2_067911C0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679FA682_2_0679FA68
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679C6482_2_0679C648
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679C6382_2_0679C638
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679F6102_2_0679F610
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679F6002_2_0679F600
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679CEF82_2_0679CEF8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679CAA02_2_0679CAA0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679CA9F2_2_0679CA9F
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679D3502_2_0679D350
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679DBF12_2_0679DBF1
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067973E82_2_067973E8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067973D82_2_067973D8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679D7A82_2_0679D7A8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067938602_2_06793860
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679E0582_2_0679E058
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679E04B2_2_0679E04B
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679001F2_2_0679001F
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679DC002_2_0679DC00
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067908FC2_2_067908FC
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679B4E82_2_0679B4E8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679E4B02_2_0679E4B0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067904A02_2_067904A0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679E4A02_2_0679E4A0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067904902_2_06790490
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_06790D602_2_06790D60
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679ED602_2_0679ED60
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_06790D512_2_06790D51
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679B9402_2_0679B940
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679B9302_2_0679B930
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679E9082_2_0679E908
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067909002_2_06790900
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679C1F02_2_0679C1F0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679F1B82_2_0679F1B8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067911B02_2_067911B0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679F1B72_2_0679F1B7
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679BD982_2_0679BD98
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_06797D902_2_06797D90
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679BD882_2_0679BD88
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CD6702_2_067CD670
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CAA582_2_067CAA58
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C86082_2_067C8608
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CB6E82_2_067CB6E8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C8B582_2_067C8B58
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CC3882_2_067CC388
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CD0282_2_067CD028
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CA4082_2_067CA408
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CB0A02_2_067CB0A0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CBD382_2_067CBD38
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CC9D82_2_067CC9D8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C11A02_2_067C11A0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C5A702_2_067C5A70
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C5A602_2_067C5A60
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CD6612_2_067CD661
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CAA482_2_067CAA48
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C56182_2_067C5618
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CB6D92_2_067CB6D9
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C5EC82_2_067C5EC8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C67782_2_067C6778
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CC3782_2_067CC378
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C67772_2_067C6777
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C37302_2_067C3730
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C63202_2_067C6320
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C631F2_2_067C631F
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CA3F82_2_067CA3F8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C6BD02_2_067C6BD0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C33B82_2_067C33B8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C33AF2_2_067C33AF
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C70502_2_067C7050
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C00402_2_067C0040
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C44302_2_067C4430
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CD0182_2_067CD018
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C28092_2_067C2809
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C28072_2_067C2807
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C78F02_2_067C78F0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C08F02_2_067C08F0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C28B02_2_067C28B0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C74A82_2_067C74A8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C04982_2_067C0498
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CB0902_2_067CB090
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C7D582_2_067C7D58
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C0D482_2_067C0D48
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CBD282_2_067CBD28
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C79002_2_067C7900
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C85F82_2_067C85F8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067CC9C82_2_067CC9C8
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C81B02_2_067C81B0
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C51982_2_067C5198
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C11912_2_067C1191
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_067C518B2_2_067C518B
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3694364610.0000000005540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000000.1224671595.0000000000992000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePano.exe* vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3689744031.0000000000EEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3695006740.00000000058E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3691221952.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3691221952.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3689390772.0000000000B87000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exeBinary or memory string: OriginalFilenamePano.exe* vs MV GOLDEN SCHULTE DETAILS.exe
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.5540000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.5540000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3005494.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3002c54.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
            Source: 00000000.00000002.3694364610.0000000005540000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
            Source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2960, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2960, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2760, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2760, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, U--.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, U--.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, U--.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, U--.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.5540000.5.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, U--.csBase64 encoded string: 'ViLs46Ni17kqXknl3a/surrcJ7pvkA8IQp2Ee8qHOw3tIovg501k+XmRyFSOdgOk'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, U--.csBase64 encoded string: 'ViLs46Ni17kqXknl3a/surrcJ7pvkA8IQp2Ee8qHOw3tIovg501k+XmRyFSOdgOk'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.5540000.5.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@2/2
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeMutant created: NULL
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3693324113.0000000003C6B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002E59000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002E13000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002E23000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002E66000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: MV GOLDEN SCHULTE DETAILS.exeVirustotal: Detection: 51%
            Source: MV GOLDEN SCHULTE DETAILS.exeReversingLabs: Detection: 58%
            Source: unknownProcess created: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe "C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe"
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess created: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe "C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe"
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess created: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe "C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3695006740.00000000058E0000.00000004.08000000.00040000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3691221952.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: MV GOLDEN SCHULTE DETAILS.exe, PC.cs.Net Code: CypherMatic System.Reflection.Assembly.Load(byte[])
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: 0x86919054 [Wed Jul 17 15:10:12 2041 UTC]
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 0_2_02D95E17 push eax; iretd 0_2_02D95E21
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 0_2_062AA153 pushad ; iretd 0_2_062AA159
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_011424B9 push 8BFFFFFFh; retf 2_2_011424BF
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_06792E78 push esp; iretd 2_2_06792E79
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_06796FE3 push es; ret 2_2_06796FE4
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_0679705B push es; iretd 2_2_0679705C
            Source: MV GOLDEN SCHULTE DETAILS.exeStatic PE information: section name: .text entropy: 7.594465058241345
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2960, type: MEMORYSTR
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeMemory allocated: 4DB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeMemory allocated: 1140000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeMemory allocated: 29E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599739Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599574Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599454Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598985Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598860Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598735Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598485Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598360Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598235Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598110Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597985Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597860Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597735Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595980Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595875Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595766Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595438Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595313Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595188Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594956Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594826Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594719Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 593985Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeWindow / User API: threadDelayed 2149Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeWindow / User API: threadDelayed 7671Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep count: 32 > 30Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -29514790517935264s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7220Thread sleep count: 2149 > 30Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -599739s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -599574s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -599454s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7220Thread sleep count: 7671 > 30Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -599219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -599094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -598985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -598860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -598735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -598610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -598485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -598360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -598235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -598110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -597985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -597860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -597735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -597610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -597485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -597360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -597235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -597110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -596985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -596860s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -596735s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -596610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -596485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -596360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -596235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -596110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595980s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -595078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -594956s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -594826s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -594719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -594610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -594485s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -594360s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -594235s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -594110s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe TID: 7212Thread sleep time: -593985s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599739Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599574Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599454Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598985Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598860Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598735Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598610Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598485Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598360Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598235Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 598110Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597985Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597860Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597735Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597610Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597485Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597360Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597235Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 597110Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596985Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596860Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596735Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596610Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596485Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596360Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596235Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595980Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595875Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595766Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595438Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595313Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595188Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 595078Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594956Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594826Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594719Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeThread delayed: delay time: 593985Jump to behavior
            Source: MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3689955345.0000000000EB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeCode function: 2_2_06797B70 LdrInitializeThunk,2_2_06797B70
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.58e0000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.58e0000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
            Source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.58e0000.6.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeProcess created: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe "C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.3691640862.0000000002DA8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2960, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2760, type: MEMORYSTR
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2960, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2760, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.MV GOLDEN SCHULTE DETAILS.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3eb9240.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e98610.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MV GOLDEN SCHULTE DETAILS.exe.3e07f70.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.3691640862.0000000002DA8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2960, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MV GOLDEN SCHULTE DETAILS.exe PID: 2760, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            Query Registry
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Security Software Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
            Process Injection
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Deobfuscate/Decode Files or Information
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script31
            Obfuscated Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
            Software Packing
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Timestomp
            DCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            MV GOLDEN SCHULTE DETAILS.exe51%VirustotalBrowse
            MV GOLDEN SCHULTE DETAILS.exe58%ReversingLabsWin32.Trojan.Generic
            MV GOLDEN SCHULTE DETAILS.exe100%AviraHEUR/AGEN.1309847
            MV GOLDEN SCHULTE DETAILS.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            reallyfreegeoip.org
            172.67.177.134
            truefalse
              high
              checkip.dyndns.com
              193.122.6.168
              truefalse
                high
                checkip.dyndns.org
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://checkip.dyndns.org/false
                    high
                    https://reallyfreegeoip.org/xml/8.46.123.189false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.orgMV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.orgMV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D6D000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.comMV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CA4000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qMV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.189$MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://reallyfreegeoip.orgMV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D9B000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D36000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D8C000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CBC000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002D5F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://reallyfreegeoip.org/xml/MV GOLDEN SCHULTE DETAILS.exe, 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MV GOLDEN SCHULTE DETAILS.exe, 00000002.00000002.3691640862.0000000002CA4000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      193.122.6.168
                                      checkip.dyndns.comUnited States
                                      31898ORACLE-BMC-31898USfalse
                                      172.67.177.134
                                      reallyfreegeoip.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1576558
                                      Start date and time:2024-12-17 09:01:06 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 7m 52s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:15
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:MV GOLDEN SCHULTE DETAILS.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/0@2/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 136
                                      • Number of non-executed functions: 46
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 23.218.208.109, 13.107.246.43, 20.12.23.50, 13.107.246.63
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      TimeTypeDescription
                                      03:02:02API Interceptor11794470x Sleep call for process: MV GOLDEN SCHULTE DETAILS.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      193.122.6.168pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      SWIFT091816-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • checkip.dyndns.org/
                                      Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      Confirm revised invoice to proceed with payment ASAP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      REQUEST FOR QUOATION AND PRICES 0108603076-24_pdf.exeGet hashmaliciousGuLoaderBrowse
                                      • checkip.dyndns.org/
                                      Bank Swift and SOA PRN0072700314159453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                      • checkip.dyndns.org/
                                      172.67.177.134pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                          PO-1124-0018- TTR-ASP1 .. 20 adet 0191621.exeGet hashmaliciousVIP KeyloggerBrowse
                                            Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                  Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                    TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      QUOTES REQUEST FOR PRICES.exeGet hashmaliciousMassLogger RATBrowse
                                                        T#U00fcbitak SAGE RfqF#U0334D#U0334P#U0334..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          checkip.dyndns.comPAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 158.101.44.242
                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 132.226.247.73
                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 193.122.130.0
                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 158.101.44.242
                                                          pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.6.168
                                                          QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 193.122.6.168
                                                          FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 158.101.44.242
                                                          REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 158.101.44.242
                                                          reallyfreegeoip.orgPAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 104.21.67.152
                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 172.67.177.134
                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.67.152
                                                          hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 104.21.67.152
                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 188.114.97.3
                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.67.152
                                                          pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.67.152
                                                          QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 104.21.67.152
                                                          FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.67.152
                                                          REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 172.67.177.134
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          ORACLE-BMC-31898USPAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 158.101.44.242
                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 193.122.130.0
                                                          ldr.ps1Get hashmaliciousGO Miner, XmrigBrowse
                                                          • 147.154.227.160
                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 193.122.130.0
                                                          end.exeGet hashmaliciousUnknownBrowse
                                                          • 130.61.86.87
                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 158.101.44.242
                                                          pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 158.101.44.242
                                                          QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 193.122.6.168
                                                          FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 158.101.44.242
                                                          CLOUDFLARENETUShttps://onedefender.xyz/w/a/s/?lp_key=17343c9645d1ac0fef5c105d161ba25127ffc78983&clickid=ctg89et00fes73cmfgu0&trk=fireclk.xyz&language=de&feed=7539&zone=3dcf5f1b&dm=1Get hashmaliciousUnknownBrowse
                                                          • 172.67.181.93
                                                          c5bnEkMx.ps1Get hashmaliciousLummaCBrowse
                                                          • 104.21.64.1
                                                          Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                          • 104.21.83.229
                                                          sEOELQpFOB.lnkGet hashmaliciousRedLineBrowse
                                                          • 188.114.97.6
                                                          ref095vq842r70_classement_atout_france.pdf.lnk.d.lnkGet hashmaliciousRedLine, SectopRATBrowse
                                                          • 188.114.97.6
                                                          payload_1.htaGet hashmaliciousRedLineBrowse
                                                          • 104.21.87.65
                                                          PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 104.21.67.152
                                                          bxAoaISZJQ.lnkGet hashmaliciousUnknownBrowse
                                                          • 172.67.139.105
                                                          ei0woJS3Dy.lnkGet hashmaliciousUnknownBrowse
                                                          • 172.67.140.151
                                                          tz1WicW6sG.lnkGet hashmaliciousUnknownBrowse
                                                          • 188.114.96.6
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          54328bd36c14bd82ddaa0c04b25ed9adPAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 172.67.177.134
                                                          pre-stowage.PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 172.67.177.134
                                                          HIROSHIMA STAR - VSL's_DETAILS.docx.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 172.67.177.134
                                                          hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 172.67.177.134
                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                          • 172.67.177.134
                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 172.67.177.134
                                                          pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 172.67.177.134
                                                          QUOTATION REQUEST - BQS058.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 172.67.177.134
                                                          FT876567090.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 172.67.177.134
                                                          REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 172.67.177.134
                                                          No context
                                                          No created / dropped files found
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.583038497316671
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          File name:MV GOLDEN SCHULTE DETAILS.exe
                                                          File size:343'552 bytes
                                                          MD5:6f6b30df02a24ad8819384f41b743a8a
                                                          SHA1:c2bdbd4518c77544484d324fc39ce7f320e59fbc
                                                          SHA256:f75da861b7cbf08727ea95e5e6111db769b818deec9d0328decc37a8a08a608f
                                                          SHA512:0efede7326f53ba4eee0bdb84657cdcfe932dd17f149c5a180559c93325d6dbbcb6060650d517f3d43f865861cf124aa8cf9b5ccc6ca29af4021800d671f4206
                                                          SSDEEP:6144:+Z+8NYTXUXYQV54TJ+dKE/5sJNYdzgtvkFoYmrbq89ATGlJYf9ktf2r8pXxcIXYF:/quNoKTodz/iNYBg9kFLmrb8TeYfStf0
                                                          TLSH:DA74CF60E8E0B263E97A367241FEE934435E7C45EA41996D3400536CFAA23473E91FB7
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...T.................0..4..........>R... ...`....@.. ....................................@................................
                                                          Icon Hash:00928e8e8686b000
                                                          Entrypoint:0x45523e
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x86919054 [Wed Jul 17 15:10:12 2041 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x551e40x57.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x560000x586.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x532440x53400f911450a29b01d0df44c4acff3853245False0.7045033314564565data7.594465058241345IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rsrc0x560000x5860x600cd0190c127aaa560b63ee4e5483f602fFalse0.412109375data4.005264498794733IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x580000xc0x20038b7319a2b856850b136768bd8555da6False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_VERSION0x560a00x2fcdata0.43455497382198954
                                                          RT_MANIFEST0x5639c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-12-17T09:02:01.336370+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749699193.122.6.16880TCP
                                                          2024-12-17T09:02:03.898894+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749699193.122.6.16880TCP
                                                          2024-12-17T09:02:05.534599+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749704172.67.177.134443TCP
                                                          2024-12-17T09:02:07.023881+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749706193.122.6.16880TCP
                                                          2024-12-17T09:02:08.643772+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749708172.67.177.134443TCP
                                                          2024-12-17T09:02:17.935425+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749727172.67.177.134443TCP
                                                          2024-12-17T09:02:24.055204+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749747172.67.177.134443TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 17, 2024 09:01:59.486332893 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:01:59.606092930 CET8049699193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:01:59.606198072 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:01:59.606422901 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:01:59.726106882 CET8049699193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:00.876338959 CET8049699193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:00.879854918 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:00.999821901 CET8049699193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:01.287127018 CET8049699193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:01.336369991 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:01.755249977 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:01.755309105 CET44349703172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:01.755398035 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:01.762149096 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:01.762167931 CET44349703172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:02.984884977 CET44349703172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:02.984966993 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:02.989631891 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:02.989640951 CET44349703172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:02.990098000 CET44349703172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:03.039479017 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:03.039937019 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:03.083328962 CET44349703172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:03.425578117 CET44349703172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:03.425750017 CET44349703172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:03.425832033 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:03.431283951 CET49703443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:03.434317112 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:03.554109097 CET8049699193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:03.846863031 CET8049699193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:03.850656033 CET49704443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:03.850692034 CET44349704172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:03.850743055 CET49704443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:03.851162910 CET49704443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:03.851182938 CET44349704172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:03.898894072 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:05.081258059 CET44349704172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:05.083456993 CET49704443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:05.083473921 CET44349704172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:05.534672022 CET44349704172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:05.534838915 CET44349704172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:05.534897089 CET49704443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:05.535141945 CET49704443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:05.538809061 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:05.539874077 CET4970680192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:05.659013033 CET8049699193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:05.659099102 CET4969980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:05.659689903 CET8049706193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:05.659771919 CET4970680192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:05.659874916 CET4970680192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:05.779589891 CET8049706193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:06.977317095 CET8049706193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:06.978380919 CET49708443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:06.978418112 CET44349708172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:06.978488922 CET49708443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:06.978729010 CET49708443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:06.978744030 CET44349708172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:07.023880959 CET4970680192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:08.198097944 CET44349708172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:08.199727058 CET49708443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:08.199754953 CET44349708172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:08.643800020 CET44349708172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:08.643966913 CET44349708172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:08.644104004 CET49708443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:08.644383907 CET49708443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:08.648245096 CET4970980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:08.768615961 CET8049709193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:08.768709898 CET4970980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:08.781404972 CET4970980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:08.901881933 CET8049709193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:10.074620008 CET8049709193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:10.077734947 CET49710443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:10.077788115 CET44349710172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:10.077862024 CET49710443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:10.078093052 CET49710443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:10.078110933 CET44349710172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:10.117635012 CET4970980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:11.301892042 CET44349710172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:11.316140890 CET49710443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:11.316175938 CET44349710172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:11.746377945 CET44349710172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:11.746539116 CET44349710172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:11.746592999 CET49710443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:11.746952057 CET49710443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:11.750468016 CET4970980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:11.751316071 CET4971280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:11.870588064 CET8049709193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:11.870654106 CET4970980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:11.871196985 CET8049712193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:11.871263981 CET4971280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:11.871366978 CET4971280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:11.991189957 CET8049712193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:13.216159105 CET8049712193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:13.217319965 CET49718443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:13.217341900 CET44349718172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:13.217406988 CET49718443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:13.217633963 CET49718443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:13.217644930 CET44349718172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:13.258359909 CET4971280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:14.435223103 CET44349718172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:14.437124968 CET49718443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:14.437146902 CET44349718172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:14.876710892 CET44349718172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:14.876869917 CET44349718172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:14.876934052 CET49718443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:14.877458096 CET49718443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:14.881798983 CET4971280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:14.883255005 CET4971980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:15.001868010 CET8049712193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:15.001988888 CET4971280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:15.003022909 CET8049719193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:15.003118992 CET4971980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:15.003381968 CET4971980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:15.123174906 CET8049719193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:16.270747900 CET8049719193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:16.272435904 CET49727443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:16.272505999 CET44349727172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:16.272588015 CET49727443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:16.272907019 CET49727443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:16.272928953 CET44349727172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:16.320801973 CET4971980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:17.487878084 CET44349727172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:17.489762068 CET49727443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:17.489813089 CET44349727172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:17.935478926 CET44349727172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:17.935575008 CET44349727172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:17.935662031 CET49727443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:17.936289072 CET49727443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:17.940785885 CET4971980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:17.942334890 CET4973480192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:18.061907053 CET8049719193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:18.062000036 CET4971980192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:18.062294006 CET8049734193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:18.062876940 CET4973480192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:18.063112020 CET4973480192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:18.183434963 CET8049734193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:19.331243992 CET8049734193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:19.332822084 CET49736443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:19.332864046 CET44349736172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:19.332959890 CET49736443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:19.333183050 CET49736443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:19.333198071 CET44349736172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:19.383323908 CET4973480192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:20.548468113 CET44349736172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:20.560517073 CET49736443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:20.560555935 CET44349736172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:20.993119001 CET44349736172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:20.993197918 CET44349736172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:20.993637085 CET49736443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:20.993761063 CET49736443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:20.997067928 CET4973480192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:20.998305082 CET4974280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:21.117207050 CET8049734193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:21.117333889 CET4973480192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:21.118022919 CET8049742193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:21.118117094 CET4974280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:21.118292093 CET4974280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:21.237966061 CET8049742193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:22.386943102 CET8049742193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:02:22.388746977 CET49747443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:22.388861895 CET44349747172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:22.388974905 CET49747443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:22.389252901 CET49747443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:22.389291048 CET44349747172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:22.432010889 CET4974280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:02:23.600850105 CET44349747172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:23.602649927 CET49747443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:23.602736950 CET44349747172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:24.055243969 CET44349747172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:24.055345058 CET44349747172.67.177.134192.168.2.7
                                                          Dec 17, 2024 09:02:24.055716038 CET49747443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:02:24.055990934 CET49747443192.168.2.7172.67.177.134
                                                          Dec 17, 2024 09:03:11.976104021 CET8049706193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:03:11.976214886 CET4970680192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:03:27.386658907 CET8049742193.122.6.168192.168.2.7
                                                          Dec 17, 2024 09:03:27.387279034 CET4974280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:04:02.399490118 CET4974280192.168.2.7193.122.6.168
                                                          Dec 17, 2024 09:04:02.519263029 CET8049742193.122.6.168192.168.2.7
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Dec 17, 2024 09:01:59.340265989 CET5904453192.168.2.71.1.1.1
                                                          Dec 17, 2024 09:01:59.478777885 CET53590441.1.1.1192.168.2.7
                                                          Dec 17, 2024 09:02:01.325298071 CET6070653192.168.2.71.1.1.1
                                                          Dec 17, 2024 09:02:01.750737906 CET53607061.1.1.1192.168.2.7
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Dec 17, 2024 09:01:59.340265989 CET192.168.2.71.1.1.10xc021Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                          Dec 17, 2024 09:02:01.325298071 CET192.168.2.71.1.1.10x1cbaStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Dec 17, 2024 09:01:59.478777885 CET1.1.1.1192.168.2.70xc021No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                          Dec 17, 2024 09:01:59.478777885 CET1.1.1.1192.168.2.70xc021No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                          Dec 17, 2024 09:01:59.478777885 CET1.1.1.1192.168.2.70xc021No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                          Dec 17, 2024 09:01:59.478777885 CET1.1.1.1192.168.2.70xc021No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                          Dec 17, 2024 09:01:59.478777885 CET1.1.1.1192.168.2.70xc021No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                          Dec 17, 2024 09:01:59.478777885 CET1.1.1.1192.168.2.70xc021No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                          Dec 17, 2024 09:02:01.750737906 CET1.1.1.1192.168.2.70x1cbaNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                          Dec 17, 2024 09:02:01.750737906 CET1.1.1.1192.168.2.70x1cbaNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                          • reallyfreegeoip.org
                                                          • checkip.dyndns.org
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.749699193.122.6.168802760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 17, 2024 09:01:59.606422901 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 17, 2024 09:02:00.876338959 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:00 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 3daf7348e9234d2681c98f13761bb2a4
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                          Dec 17, 2024 09:02:00.879854918 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 17, 2024 09:02:01.287127018 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:01 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: a8da3096dc4ea33ba2c239c0229ccd1d
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                          Dec 17, 2024 09:02:03.434317112 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 17, 2024 09:02:03.846863031 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:03 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 062863942b7aed414ec842c5e0633ae5
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.749706193.122.6.168802760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 17, 2024 09:02:05.659874916 CET127OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Dec 17, 2024 09:02:06.977317095 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:06 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 64712a34dad3ab859cacad4b00a06689
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.749709193.122.6.168802760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 17, 2024 09:02:08.781404972 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 17, 2024 09:02:10.074620008 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:09 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 93e9781188fc96d11a3e7eb4d094cf8d
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.749712193.122.6.168802760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 17, 2024 09:02:11.871366978 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 17, 2024 09:02:13.216159105 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:13 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 86018682a66d7cc2561a67c993d25225
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.749719193.122.6.168802760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 17, 2024 09:02:15.003381968 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 17, 2024 09:02:16.270747900 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:16 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 64c3570f35305587380c5009615697d8
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.749734193.122.6.168802760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 17, 2024 09:02:18.063112020 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 17, 2024 09:02:19.331243992 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:19 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: a8a610d04ae79e86843c4367acb755e7
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.749742193.122.6.168802760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          Dec 17, 2024 09:02:21.118292093 CET151OUTGET / HTTP/1.1
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                          Host: checkip.dyndns.org
                                                          Connection: Keep-Alive
                                                          Dec 17, 2024 09:02:22.386943102 CET321INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:22 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 104
                                                          Connection: keep-alive
                                                          Cache-Control: no-cache
                                                          Pragma: no-cache
                                                          X-Request-ID: 6410c318a8e93b65d44f1e377a161375
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.749703172.67.177.1344432760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-17 08:02:03 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-17 08:02:03 UTC880INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:03 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 411292
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ixwqf%2BD2noNys%2BrMvY9y7Kc3vjXA5Drr6tfW2kgbmJHv7NRtpQUDFCKkp6eEx%2BU3pUXuX5jY%2BMpXXjlGYE03m7hMAkjL%2FP4RfgEdCOgiKmrT83NA8fHtQE6bUqQraOk1SAGKYyQK"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f3563825f3c8c21-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1824&min_rtt=1817&rtt_var=697&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1554018&cwnd=242&unsent_bytes=0&cid=07042815ef0edfe2&ts=456&x=0"
                                                          2024-12-17 08:02:03 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.749704172.67.177.1344432760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-17 08:02:05 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-12-17 08:02:05 UTC878INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:05 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 411294
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FFQniMO%2BtlTfOzPJ8Rte1BDKBJzsY82QVk8M5izuFC1tVLOMExrZZ2Qtj06PbLV1FOS4tlw%2B84mlTv49S50qjI08m6fQwU8d3BXslAB%2BNcaqXxTpw8WRWg2Qs9HDQCkTcl0Ajc%2BZ"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f35638f8a0b0f93-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1635&min_rtt=1629&rtt_var=623&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1738095&cwnd=168&unsent_bytes=0&cid=94f71723d0f92754&ts=458&x=0"
                                                          2024-12-17 08:02:05 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.749708172.67.177.1344432760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-17 08:02:08 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-12-17 08:02:08 UTC882INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:08 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 411297
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N3C5kabkv4if%2FPMLa0%2FTRtSuxd01YcXQWq4GpMVQ3d6eZE2U5t82aS%2Bi1lkegqj8D8oGfR%2B2bgsV69QAeMlVdBWEcAfvaqAxVCcOo1o11jHbaAnQFqRJiPkSlUI5nnhrr%2FA%2BqnVg"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f3563a2fd6e5e5f-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1735&min_rtt=1581&rtt_var=902&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1035828&cwnd=251&unsent_bytes=0&cid=1f45ea878b2ebac9&ts=455&x=0"
                                                          2024-12-17 08:02:08 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.749710172.67.177.1344432760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-17 08:02:11 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-17 08:02:11 UTC884INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:11 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 411300
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QQlVyyNo6k%2BQgyflhGNkRN0HMcwcXSEbYDCT%2FDNmlAxI%2BCE7pK5pcvwMR2E0UN%2FlG7fMj1kpe1Vfid8ehu5NIfCizlle%2BxO4rlpJC1E%2BbGij44ItOpf5BXO2j4i8nKjW%2F0A26VzI"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f3563b668b942ef-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2208&min_rtt=2174&rtt_var=883&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1193785&cwnd=218&unsent_bytes=0&cid=a82df09f0f76f6ac&ts=452&x=0"
                                                          2024-12-17 08:02:11 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.749718172.67.177.1344432760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-17 08:02:14 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-17 08:02:14 UTC876INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:14 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 411303
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NzGJYE32rbboYNpJhCb9%2B9Hza9MVUc%2BDrXz4KUum3qD4S8ATa9Ulz8NJKIQLpHnWwbu1uEb3uBJ2PrOpIijXYabykZuOiuOVYFMIWYB4xrHfKBN8%2Frqw3M1sdEWyXccf0XFmcxIU"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f3563c9ffffde9a-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1690&min_rtt=1602&rtt_var=664&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1822721&cwnd=209&unsent_bytes=0&cid=43bdc438120d3d42&ts=450&x=0"
                                                          2024-12-17 08:02:14 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.749727172.67.177.1344432760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-17 08:02:17 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-12-17 08:02:17 UTC878INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:17 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 411306
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1ZwRGghRsjy%2F5sZ8jwu4tNs3bKs%2BrKL%2FP4pUv2VVxNG96mA34ov5Nwwc%2B0BYPxV7ZdzmAxZ4psj3TqQKJWdrMcOJmqevOlC5YLHMz0PSkezHyN0RgClJ9OeqXxYA8M1qOYMgH9qd"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f3563dd0b667ca2-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1860&min_rtt=1812&rtt_var=776&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2850&recv_bytes=699&delivery_rate=1327272&cwnd=239&unsent_bytes=0&cid=9cfdf9e03dbf2f97&ts=452&x=0"
                                                          2024-12-17 08:02:17 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.749736172.67.177.1344432760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-17 08:02:20 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          Connection: Keep-Alive
                                                          2024-12-17 08:02:20 UTC878INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:20 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 411309
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qTZWtfQjk5KPvVhpc3J1NmXN4HNaJjC%2FSfXW0SSYyQ%2FxIeC5FFrq4oFoWaVWnp1GeecGl0qcEOAmCrk1FC6t6Sf4vYKPOIjIiPXUw%2BsGS5oJwW6Dg%2FtOZgBGfUekX7fVxad2lmoH"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f3563f02a5542b8-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1737&min_rtt=1732&rtt_var=659&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1647855&cwnd=232&unsent_bytes=0&cid=7eab09f5f2134a3e&ts=450&x=0"
                                                          2024-12-17 08:02:20 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.749747172.67.177.1344432760C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-12-17 08:02:23 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                          Host: reallyfreegeoip.org
                                                          2024-12-17 08:02:24 UTC878INHTTP/1.1 200 OK
                                                          Date: Tue, 17 Dec 2024 08:02:23 GMT
                                                          Content-Type: text/xml
                                                          Content-Length: 362
                                                          Connection: close
                                                          Cache-Control: max-age=31536000
                                                          CF-Cache-Status: HIT
                                                          Age: 411312
                                                          Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cSMFv%2FLUXT6JfmxrcdZf%2FBfddQI3cMO9y82104XJbCy81R4bitmaP7l%2BF2ED1UZBiEzHjkLD262LJCEpCWtYTksB7zWmnV%2BZ6hbo4Qfyg2nIpwAumVhw1jXe5VCsNTYoTsul6IrW"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8f3564034d8b4380-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1578&min_rtt=1574&rtt_var=598&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1817050&cwnd=220&unsent_bytes=0&cid=e673f45f13384a24&ts=460&x=0"
                                                          2024-12-17 08:02:24 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:03:01:57
                                                          Start date:17/12/2024
                                                          Path:C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe"
                                                          Imagebase:0x990000
                                                          File size:343'552 bytes
                                                          MD5 hash:6F6B30DF02A24AD8819384F41B743A8A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: MALWARE_Win_DLInjector02, Description: Detects downloader injector, Source: 00000000.00000002.3694364610.0000000005540000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.3692686155.0000000003DB9000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:2
                                                          Start time:03:01:57
                                                          Start date:17/12/2024
                                                          Path:C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\MV GOLDEN SCHULTE DETAILS.exe"
                                                          Imagebase:0x7a0000
                                                          File size:343'552 bytes
                                                          MD5 hash:6F6B30DF02A24AD8819384F41B743A8A
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.3691640862.0000000002DA8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.3689134012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.3691640862.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:8.1%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:130
                                                            Total number of Limit Nodes:13
                                                            execution_graph 24812 2d9d3d8 24813 2d9d41e GetCurrentProcess 24812->24813 24815 2d9d469 24813->24815 24816 2d9d470 GetCurrentThread 24813->24816 24815->24816 24817 2d9d4ad GetCurrentProcess 24816->24817 24818 2d9d4a6 24816->24818 24819 2d9d4e3 24817->24819 24818->24817 24820 2d9d50b GetCurrentThreadId 24819->24820 24821 2d9d53c 24820->24821 24831 2d94668 24832 2d9467a 24831->24832 24833 2d94686 24832->24833 24837 2d94779 24832->24837 24842 2d93e10 24833->24842 24835 2d946a5 24838 2d9479d 24837->24838 24846 2d94888 24838->24846 24850 2d94878 24838->24850 24843 2d93e1b 24842->24843 24858 2d95c64 24843->24858 24845 2d96fcf 24845->24835 24848 2d948af 24846->24848 24847 2d9498c 24847->24847 24848->24847 24854 2d94248 24848->24854 24852 2d94888 24850->24852 24851 2d9498c 24851->24851 24852->24851 24853 2d94248 CreateActCtxA 24852->24853 24853->24851 24855 2d95918 CreateActCtxA 24854->24855 24857 2d959db 24855->24857 24859 2d95c6f 24858->24859 24862 2d95c84 24859->24862 24861 2d97085 24861->24845 24863 2d95c8f 24862->24863 24866 2d95cb4 24863->24866 24865 2d97162 24865->24861 24867 2d95cbf 24866->24867 24870 2d95ce4 24867->24870 24869 2d97265 24869->24865 24872 2d95cef 24870->24872 24871 2d98235 24872->24871 24874 2d9856b 24872->24874 24877 2d9ac18 24872->24877 24873 2d985a9 24873->24869 24874->24873 24881 2d9cd00 24874->24881 24886 2d9ac40 24877->24886 24889 2d9ac50 24877->24889 24878 2d9ac2e 24878->24874 24882 2d9cd31 24881->24882 24883 2d9cd55 24882->24883 24897 2d9ceb1 24882->24897 24901 2d9cec0 24882->24901 24883->24873 24887 2d9ac5f 24886->24887 24892 2d9ad48 24886->24892 24887->24878 24891 2d9ad48 GetModuleHandleW 24889->24891 24890 2d9ac5f 24890->24878 24891->24890 24893 2d9ad7c 24892->24893 24894 2d9ad59 24892->24894 24893->24887 24894->24893 24895 2d9af80 GetModuleHandleW 24894->24895 24896 2d9afad 24895->24896 24896->24887 24899 2d9cec0 24897->24899 24898 2d9cf07 24898->24883 24899->24898 24905 2d9b720 24899->24905 24903 2d9cecd 24901->24903 24902 2d9cf07 24902->24883 24903->24902 24904 2d9b720 3 API calls 24903->24904 24904->24902 24906 2d9b72b 24905->24906 24908 2d9dc18 24906->24908 24909 2d9d024 24906->24909 24908->24908 24910 2d9d02f 24909->24910 24911 2d95ce4 3 API calls 24910->24911 24912 2d9dc87 24911->24912 24913 2d9dc96 24912->24913 24916 2d9dd00 24912->24916 24920 2d9dcf2 24912->24920 24913->24908 24917 2d9dd2e 24916->24917 24918 2d9ddfa KiUserCallbackDispatcher 24917->24918 24919 2d9ddff 24917->24919 24918->24919 24919->24919 24921 2d9dd00 24920->24921 24922 2d9ddfa KiUserCallbackDispatcher 24921->24922 24923 2d9ddff 24921->24923 24922->24923 24924 2d9fee0 24925 2d9ff07 24924->24925 24929 62a0287 24925->24929 24934 62a02ab 24925->24934 24926 2d9ff2b 24930 62a02ac 24929->24930 24931 62a028d 24929->24931 24939 62a0588 PostMessageW 24930->24939 24941 62a0563 PostMessageW 24930->24941 24931->24926 24935 62a02be 24934->24935 24937 62a0588 PostMessageW 24935->24937 24938 62a0563 PostMessageW 24935->24938 24936 62a02e1 24936->24926 24937->24936 24938->24936 24940 62a05f4 24939->24940 24940->24931 24942 62a05f4 24941->24942 24942->24931 24943 2d9d620 DuplicateHandle 24944 2d9d6b6 24943->24944 24822 62a9680 24823 62a96e5 24822->24823 24824 62a7a30 PeekMessageW 24823->24824 24825 62a9b48 WaitMessage 24823->24825 24827 62a9732 24823->24827 24828 62a92ac 24823->24828 24824->24823 24825->24823 24829 62aa3e8 DispatchMessageW 24828->24829 24830 62aa454 24829->24830 24830->24823 24945 62a1a70 24946 62a1a8a 24945->24946 24949 62a1a9d 24945->24949 24951 62a0760 24946->24951 24948 62a1ae3 24949->24948 24950 62a0760 OleInitialize 24949->24950 24950->24948 24952 62a076b 24951->24952 24953 62a1b0e 24952->24953 24956 62a1b38 24952->24956 24962 62a1b48 24952->24962 24953->24949 24957 62a1e50 24956->24957 24958 62a1b70 24956->24958 24957->24953 24959 62a1b79 24958->24959 24968 62a07fc 24958->24968 24959->24953 24961 62a1b9c 24961->24961 24963 62a1e50 24962->24963 24964 62a1b70 24962->24964 24963->24953 24965 62a1b79 24964->24965 24966 62a07fc OleInitialize 24964->24966 24965->24953 24967 62a1b9c 24966->24967 24969 62a0807 24968->24969 24970 62a1e93 24969->24970 24972 62a0818 24969->24972 24970->24961 24973 62a1ec8 OleInitialize 24972->24973 24974 62a1f2c 24973->24974 24974->24970

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 361 62a9680-62a96e3 362 62a9712-62a9730 361->362 363 62a96e5-62a970f 361->363 368 62a9739-62a9770 362->368 369 62a9732-62a9734 362->369 363->362 373 62a9ba1 368->373 374 62a9776-62a978a 368->374 370 62a9bf2-62a9c07 369->370 377 62a9ba6-62a9bbc 373->377 375 62a97b9-62a97d8 374->375 376 62a978c-62a97b6 374->376 383 62a97da-62a97e0 375->383 384 62a97f0-62a97f2 375->384 376->375 377->370 386 62a97e2 383->386 387 62a97e4-62a97e6 383->387 388 62a9811-62a981a 384->388 389 62a97f4-62a980c 384->389 386->384 387->384 390 62a9822-62a9829 388->390 389->377 391 62a982b-62a9831 390->391 392 62a9833-62a983a 390->392 393 62a9847-62a9864 call 62a7a30 391->393 394 62a983c-62a9842 392->394 395 62a9844 392->395 398 62a986a-62a9871 393->398 399 62a99b9-62a99bd 393->399 394->393 395->393 398->373 402 62a9877-62a98b4 398->402 400 62a9b8c-62a9b9f 399->400 401 62a99c3-62a99c7 399->401 400->377 403 62a99c9-62a99dc 401->403 404 62a99e1-62a99ea 401->404 410 62a98ba-62a98bf 402->410 411 62a9b82-62a9b86 402->411 403->377 405 62a9a19-62a9a20 404->405 406 62a99ec-62a9a16 404->406 408 62a9abf-62a9ad4 405->408 409 62a9a26-62a9a2d 405->409 406->405 408->411 424 62a9ada-62a9adc 408->424 413 62a9a2f-62a9a59 409->413 414 62a9a5c-62a9a7e 409->414 415 62a98f1-62a9906 call 62a9284 410->415 416 62a98c1-62a98cf call 62a926c 410->416 411->390 411->400 413->414 414->408 451 62a9a80-62a9a8a 414->451 422 62a990b-62a990f 415->422 416->415 426 62a98d1-62a98ef call 62a9278 416->426 427 62a9980-62a998d 422->427 428 62a9911-62a9923 call 62a9290 422->428 429 62a9b29-62a9b46 call 62a7a30 424->429 430 62a9ade-62a9b17 424->430 426->422 427->411 443 62a9993-62a999d call 62a92a0 427->443 455 62a9963-62a997b 428->455 456 62a9925-62a9955 428->456 429->411 442 62a9b48-62a9b74 WaitMessage 429->442 446 62a9b19-62a9b1f 430->446 447 62a9b20-62a9b27 430->447 448 62a9b7b 442->448 449 62a9b76 442->449 457 62a999f-62a99a2 call 62a92ac 443->457 458 62a99ac-62a99b4 call 62a92b8 443->458 446->447 447->411 448->411 449->448 462 62a9a8c-62a9a92 451->462 463 62a9aa2-62a9abd 451->463 455->377 465 62a995c 456->465 466 62a9957 456->466 467 62a99a7 457->467 458->411 469 62a9a96-62a9a98 462->469 470 62a9a94 462->470 463->408 463->451 465->455 466->465 467->411 469->463 470->463
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: DispatchMessage
                                                            • String ID:
                                                            • API String ID: 2061451462-0
                                                            • Opcode ID: b46f60c59c3a8ee543d2d6509cc704fe49bbd4513a3d80d7861601e4d8530753
                                                            • Instruction ID: 785b16aff02c5e47bc21e2dd8cf96a94fa793452d0265805378ed055da7b64ba
                                                            • Opcode Fuzzy Hash: b46f60c59c3a8ee543d2d6509cc704fe49bbd4513a3d80d7861601e4d8530753
                                                            • Instruction Fuzzy Hash: 54F13B30E20309CFDB54DFAAC944BADBBF1BF88314F158559E805AF255DBB0A985CB90
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e13b74ae40f6d9b098d07d9d0014ea52a731e29c52f7964b37e5f98b3f7c943b
                                                            • Instruction ID: a55d008782370517aca69c9012e9334b8ac68c5515790d7ba6282061e5457189
                                                            • Opcode Fuzzy Hash: e13b74ae40f6d9b098d07d9d0014ea52a731e29c52f7964b37e5f98b3f7c943b
                                                            • Instruction Fuzzy Hash: 6651F832D14385CFDB02EBB4D8506CABBB1FF9A310F168756E194BB291EB306585CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 294 2d9d3c9-2d9d467 GetCurrentProcess 298 2d9d469-2d9d46f 294->298 299 2d9d470-2d9d4a4 GetCurrentThread 294->299 298->299 300 2d9d4ad-2d9d4e1 GetCurrentProcess 299->300 301 2d9d4a6-2d9d4ac 299->301 302 2d9d4ea-2d9d505 call 2d9d5a8 300->302 303 2d9d4e3-2d9d4e9 300->303 301->300 307 2d9d50b-2d9d53a GetCurrentThreadId 302->307 303->302 308 2d9d53c-2d9d542 307->308 309 2d9d543-2d9d5a5 307->309 308->309
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 02D9D456
                                                            • GetCurrentThread.KERNEL32 ref: 02D9D493
                                                            • GetCurrentProcess.KERNEL32 ref: 02D9D4D0
                                                            • GetCurrentThreadId.KERNEL32 ref: 02D9D529
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: c7481022da3ba7bf1732ed4685b361f1c7c7ca76e168c204a0a80d3a60595011
                                                            • Instruction ID: 2d2526c981299f0a33a684ab979eecadf5413bfd2d8b795fa27170be25c6bd4c
                                                            • Opcode Fuzzy Hash: c7481022da3ba7bf1732ed4685b361f1c7c7ca76e168c204a0a80d3a60595011
                                                            • Instruction Fuzzy Hash: 9E5156B49003098FDB18DFA9D548B9EBBF2BF48314F20845AE009AB360D734A944CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 316 2d9d3d8-2d9d467 GetCurrentProcess 320 2d9d469-2d9d46f 316->320 321 2d9d470-2d9d4a4 GetCurrentThread 316->321 320->321 322 2d9d4ad-2d9d4e1 GetCurrentProcess 321->322 323 2d9d4a6-2d9d4ac 321->323 324 2d9d4ea-2d9d505 call 2d9d5a8 322->324 325 2d9d4e3-2d9d4e9 322->325 323->322 329 2d9d50b-2d9d53a GetCurrentThreadId 324->329 325->324 330 2d9d53c-2d9d542 329->330 331 2d9d543-2d9d5a5 329->331 330->331
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32 ref: 02D9D456
                                                            • GetCurrentThread.KERNEL32 ref: 02D9D493
                                                            • GetCurrentProcess.KERNEL32 ref: 02D9D4D0
                                                            • GetCurrentThreadId.KERNEL32 ref: 02D9D529
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: Current$ProcessThread
                                                            • String ID:
                                                            • API String ID: 2063062207-0
                                                            • Opcode ID: 1c7b0ee98eaec3b129976653c83f0d63242cbc4d0bd91116ff923b7795181f88
                                                            • Instruction ID: 0c58fdc49df75164bd59dca4371ddcab8c47636d61a27bdc03c68219844105e9
                                                            • Opcode Fuzzy Hash: 1c7b0ee98eaec3b129976653c83f0d63242cbc4d0bd91116ff923b7795181f88
                                                            • Instruction Fuzzy Hash: AF5155B4D003098FDB18DFAAD548BAEFBF6BF48314F208459E419AB360DB746944CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 473 2d9ad48-2d9ad57 474 2d9ad59-2d9ad66 call 2d9a0a0 473->474 475 2d9ad83-2d9ad87 473->475 480 2d9ad68 474->480 481 2d9ad7c 474->481 477 2d9ad89-2d9ad93 475->477 478 2d9ad9b-2d9addc 475->478 477->478 484 2d9ade9-2d9adf7 478->484 485 2d9adde-2d9ade6 478->485 529 2d9ad6e call 2d9afd0 480->529 530 2d9ad6e call 2d9afe0 480->530 481->475 486 2d9adf9-2d9adfe 484->486 487 2d9ae1b-2d9ae1d 484->487 485->484 489 2d9ae09 486->489 490 2d9ae00-2d9ae07 call 2d9a0ac 486->490 492 2d9ae20-2d9ae27 487->492 488 2d9ad74-2d9ad76 488->481 491 2d9aeb8-2d9af78 488->491 494 2d9ae0b-2d9ae19 489->494 490->494 524 2d9af7a-2d9af7d 491->524 525 2d9af80-2d9afab GetModuleHandleW 491->525 495 2d9ae29-2d9ae31 492->495 496 2d9ae34-2d9ae3b 492->496 494->492 495->496 498 2d9ae48-2d9ae4a call 2d9a0bc 496->498 499 2d9ae3d-2d9ae45 496->499 503 2d9ae4f-2d9ae51 498->503 499->498 504 2d9ae5e-2d9ae63 503->504 505 2d9ae53-2d9ae5b 503->505 506 2d9ae81-2d9ae8e 504->506 507 2d9ae65-2d9ae6c 504->507 505->504 514 2d9aeb1-2d9aeb7 506->514 515 2d9ae90-2d9aeae 506->515 507->506 509 2d9ae6e-2d9ae7e call 2d9a0cc call 2d9a0dc 507->509 509->506 515->514 524->525 526 2d9afad-2d9afb3 525->526 527 2d9afb4-2d9afc8 525->527 526->527 529->488 530->488
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02D9AF9E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 0c76e4208d69efdd8268249d0359984f915a3cbfec25b2df62c2c4cc750593bd
                                                            • Instruction ID: 6f9ac8d64991b65893f9ea0e31eabcb29aa726d1731a919634f5485855d85530
                                                            • Opcode Fuzzy Hash: 0c76e4208d69efdd8268249d0359984f915a3cbfec25b2df62c2c4cc750593bd
                                                            • Instruction Fuzzy Hash: 4B711272A00B058FDB24DF29D44579ABBF5FF88304F10892EE48A9BB40DB75E845CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 531 2d94248-2d959d9 CreateActCtxA 534 2d959db-2d959e1 531->534 535 2d959e2-2d95a3c 531->535 534->535 542 2d95a4b-2d95a4f 535->542 543 2d95a3e-2d95a41 535->543 544 2d95a51-2d95a5d 542->544 545 2d95a60-2d95a90 542->545 543->542 544->545 549 2d95a42-2d95a47 545->549 550 2d95a92-2d95b14 545->550 549->542
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 02D959C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: b37349aed3b64ad83717f5ed1d3aed7f39b75c65ed2c748097e1459ee5948f41
                                                            • Instruction ID: 721b19a6a0f5805b99d3fbe67a6354f2f8aa37be7b247b97a101847ec178d291
                                                            • Opcode Fuzzy Hash: b37349aed3b64ad83717f5ed1d3aed7f39b75c65ed2c748097e1459ee5948f41
                                                            • Instruction Fuzzy Hash: 6341CF70C00719DFEF25DFA9C885B9DBBB5BF48304F60806AE408AB251DB75694ACF94

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 553 2d9590d-2d959d9 CreateActCtxA 555 2d959db-2d959e1 553->555 556 2d959e2-2d95a3c 553->556 555->556 563 2d95a4b-2d95a4f 556->563 564 2d95a3e-2d95a41 556->564 565 2d95a51-2d95a5d 563->565 566 2d95a60-2d95a90 563->566 564->563 565->566 570 2d95a42-2d95a47 566->570 571 2d95a92-2d95b14 566->571 570->563
                                                            APIs
                                                            • CreateActCtxA.KERNEL32(?), ref: 02D959C9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: 1dd9a7d618b19e0e458bc41a7fe8055aac537e4fb8e69f18c6dd56f99b62b7a9
                                                            • Instruction ID: 9502c30c3f73cd7fa5e63830eaa9cef0c74575859d17fc3d6fa27ec92c5ddee4
                                                            • Opcode Fuzzy Hash: 1dd9a7d618b19e0e458bc41a7fe8055aac537e4fb8e69f18c6dd56f99b62b7a9
                                                            • Instruction Fuzzy Hash: A241EF70C007198FEF25CFA9C885BDDBBB5BF48304F60806AE408AB250DB75694ACF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 574 2d9d619-2d9d6b4 DuplicateHandle 575 2d9d6bd-2d9d6da 574->575 576 2d9d6b6-2d9d6bc 574->576 576->575
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D9D6A7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: eddb2f184495d672c6cda522516b1c4a2c5022461671ff6a246aef400303880e
                                                            • Instruction ID: e8980894f97c718d8f6c0770d17e895a5132621d6b1b46ad7547c776acc99234
                                                            • Opcode Fuzzy Hash: eddb2f184495d672c6cda522516b1c4a2c5022461671ff6a246aef400303880e
                                                            • Instruction Fuzzy Hash: A021E0B5D002499FDF10CFAAD984ADEBBF5FB48314F24841AE958A7350D378A944CF64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 579 2d9d620-2d9d6b4 DuplicateHandle 580 2d9d6bd-2d9d6da 579->580 581 2d9d6b6-2d9d6bc 579->581 581->580
                                                            APIs
                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D9D6A7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: DuplicateHandle
                                                            • String ID:
                                                            • API String ID: 3793708945-0
                                                            • Opcode ID: c11e6f7f2c49baa811b51a88fc2c247ed6a14671e03aa0e0941f0f7e8a2a75bd
                                                            • Instruction ID: 89cc679372b5fac6be4043d8954619fff97404965fda3b23200aa912488a526f
                                                            • Opcode Fuzzy Hash: c11e6f7f2c49baa811b51a88fc2c247ed6a14671e03aa0e0941f0f7e8a2a75bd
                                                            • Instruction Fuzzy Hash: 1121E0B5D002489FDF10CFAAD984ADEBBF9FB48310F14841AE958A7350C378A940CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 584 62a0563-62a05f2 PostMessageW 585 62a05fb-62a061c 584->585 586 62a05f4-62a05fa 584->586 586->585
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 062A05E5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 3f33d985d2d2fd0c247ec3b055be7c424d65c1c1ee5121a6b0ee150b04b63050
                                                            • Instruction ID: 3924f47e6fd13e41bf08db724a6b1f1a56517eb8cf2770352b77a50c531a6b1e
                                                            • Opcode Fuzzy Hash: 3f33d985d2d2fd0c247ec3b055be7c424d65c1c1ee5121a6b0ee150b04b63050
                                                            • Instruction Fuzzy Hash: F12179B18043898FDB11CFA5C845BDEBFF4EB09320F14449AD454E7692C378A544CFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 588 62a7a30-62a9cbd PeekMessageW 590 62a9cbf-62a9cc5 588->590 591 62a9cc6-62a9ce7 588->591 590->591
                                                            APIs
                                                            • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,062A9862,00000000,00000000,03DB4108,02DD0548), ref: 062A9CB0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: MessagePeek
                                                            • String ID:
                                                            • API String ID: 2222842502-0
                                                            • Opcode ID: 4ff0548e1ffc497496943f4c684d8460caa0638f231a70c80434da74aa915583
                                                            • Instruction ID: a748019e0711205b491b5ee990659c127b85f595055c61ae5bd58b5dc8c9adb1
                                                            • Opcode Fuzzy Hash: 4ff0548e1ffc497496943f4c684d8460caa0638f231a70c80434da74aa915583
                                                            • Instruction Fuzzy Hash: 2211E7B5C107499FDB10CF9AD944BDEBBF4FB48310F10842AE958A7251D378A544CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 593 62a9c43 594 62a9c48-62a9cbd PeekMessageW 593->594 595 62a9cbf-62a9cc5 594->595 596 62a9cc6-62a9ce7 594->596 595->596
                                                            APIs
                                                            • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,062A9862,00000000,00000000,03DB4108,02DD0548), ref: 062A9CB0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: MessagePeek
                                                            • String ID:
                                                            • API String ID: 2222842502-0
                                                            • Opcode ID: ba0f76e3e7599c4ccf5c8bd59dbc299bb761b86a989210079822711af9db78dc
                                                            • Instruction ID: 98887c447b44388461663f86681e8d69351c134aed65740ff7c1b54848285987
                                                            • Opcode Fuzzy Hash: ba0f76e3e7599c4ccf5c8bd59dbc299bb761b86a989210079822711af9db78dc
                                                            • Instruction Fuzzy Hash: 0611E4B5C102499FDB10CF9AD944BDEBBF8FB48310F10842AE958A7350C378A544CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 598 62a0588-62a05f2 PostMessageW 599 62a05fb-62a061c 598->599 600 62a05f4-62a05fa 598->600 600->599
                                                            APIs
                                                            • PostMessageW.USER32(?,?,?,?), ref: 062A05E5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: MessagePost
                                                            • String ID:
                                                            • API String ID: 410705778-0
                                                            • Opcode ID: 55816e574bdcc4e65f5a211af025f905d0476d8e3fae41d784298c76c012857c
                                                            • Instruction ID: 7fb300e2aff63fd1f32bfebfff26198d6413ef7d5fad53421949c7be5e5e92bf
                                                            • Opcode Fuzzy Hash: 55816e574bdcc4e65f5a211af025f905d0476d8e3fae41d784298c76c012857c
                                                            • Instruction Fuzzy Hash: 6411E6B58003499FDB10CF9AC885BDEBBF8FB48314F10841AE554A7640D379A544CFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 602 2d9af38-2d9af78 603 2d9af7a-2d9af7d 602->603 604 2d9af80-2d9afab GetModuleHandleW 602->604 603->604 605 2d9afad-2d9afb3 604->605 606 2d9afb4-2d9afc8 604->606 605->606
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02D9AF9E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: HandleModule
                                                            • String ID:
                                                            • API String ID: 4139908857-0
                                                            • Opcode ID: 47cac10ffdbfdf9237a6ad341c09fbe1b5d6650f0d6a7d006c4fc8b64a52267e
                                                            • Instruction ID: 4c50d7f4c5dd9980ddbb379989fe6e28b49d213004f19a19dfdb71f61d2c1812
                                                            • Opcode Fuzzy Hash: 47cac10ffdbfdf9237a6ad341c09fbe1b5d6650f0d6a7d006c4fc8b64a52267e
                                                            • Instruction Fuzzy Hash: C71110B6C002498FCF20CF9AD444BDEFBF4AB88214F10842AE829A7340C379A545CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 062A1F1D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 257c6cf138a5a1e058ee14db6fab22b669d6b49a6a298e2b16537aa3126098c1
                                                            • Instruction ID: 1c4d479707cd3e0f8f958dcfe464c388712a0b2b94c7f8a760ed2ab5ff598bf9
                                                            • Opcode Fuzzy Hash: 257c6cf138a5a1e058ee14db6fab22b669d6b49a6a298e2b16537aa3126098c1
                                                            • Instruction Fuzzy Hash: F51103B5C103498FDB20DF9AD489BDEBBF4EB48324F20841AD959A7240C379A545CFA9
                                                            APIs
                                                            • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,062A99A7), ref: 062AA445
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: DispatchMessage
                                                            • String ID:
                                                            • API String ID: 2061451462-0
                                                            • Opcode ID: 43c40d0fdbb108796fbabc8b8e105504c6997d51ddd6cef150577e7021013bd7
                                                            • Instruction ID: 05757c067460767dc9c0bcac84d8d0c0a258d04d542cc5ca154bc7baa890dced
                                                            • Opcode Fuzzy Hash: 43c40d0fdbb108796fbabc8b8e105504c6997d51ddd6cef150577e7021013bd7
                                                            • Instruction Fuzzy Hash: 6D11E0B5C147498FCB20CF9AD484BDEFBF4EB48314F10842AE958A7210D3B9A544CFA5
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 062A1F1D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: Initialize
                                                            • String ID:
                                                            • API String ID: 2538663250-0
                                                            • Opcode ID: 02d8f2aa3e942975bcf39916f612691b3e5e1b570b4d568f599c5697d88a4c1d
                                                            • Instruction ID: fdb9bd3dd5c54126663908567e875320aa30ff0834f83fe1a3822d38df65a377
                                                            • Opcode Fuzzy Hash: 02d8f2aa3e942975bcf39916f612691b3e5e1b570b4d568f599c5697d88a4c1d
                                                            • Instruction Fuzzy Hash: 0A1103B5C103498FDB20DF9AD548BDEBBF4EB48324F208459E919A7640C379A944CFA9
                                                            APIs
                                                            • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,062A99A7), ref: 062AA445
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3695679923.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_62a0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: DispatchMessage
                                                            • String ID:
                                                            • API String ID: 2061451462-0
                                                            • Opcode ID: 3c067dabb39cacbc5f76ec1b396eb1ff364d7f77a850ac059e32edadcf7b957e
                                                            • Instruction ID: d980c5816259e9ece169c53f00fc21f5ede05c98c147a72eed6a19cc759cf4b5
                                                            • Opcode Fuzzy Hash: 3c067dabb39cacbc5f76ec1b396eb1ff364d7f77a850ac059e32edadcf7b957e
                                                            • Instruction Fuzzy Hash: 4611FEB5C102498FCB20CF9AD848BDEFBF4EB48314F10842AE928A7200D378A544CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690654363.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_12fd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64b7fc228ac09fa4f1a0289c5b84996e5aa337e291e782f8ce2dd6a6629ec97f
                                                            • Instruction ID: 73bad795ec22018a4fd65c668f1c92e439148bc2dba7fa1b87dbe341d57d87e6
                                                            • Opcode Fuzzy Hash: 64b7fc228ac09fa4f1a0289c5b84996e5aa337e291e782f8ce2dd6a6629ec97f
                                                            • Instruction Fuzzy Hash: 5D213371510208EFDB15DF94E9C4B26FFA1FB88318F20C57DEA090B256C336D446CAA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690654363.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_12fd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e2f5c3885b183cd0df8235d72447f3ce4aa9fc0fce19c51d0cd67abe6438d899
                                                            • Instruction ID: ede884b64be0b84e33f6991db243403489f5ad8a74d6bfbc8f7822eb58ea5fab
                                                            • Opcode Fuzzy Hash: e2f5c3885b183cd0df8235d72447f3ce4aa9fc0fce19c51d0cd67abe6438d899
                                                            • Instruction Fuzzy Hash: 85213375510208EFDB15DF94D9C0B56FBA5FB88324F20C17CEA0A0B256C336E446CAA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690826620.0000000002BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BBD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2bbd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 69cf89da5bfc63c55b2a86f9f1d08a66646c16740cbbeda139043dcc37bdf7b4
                                                            • Instruction ID: e6e67b3d7797bf9d7ba765f56ab2ef99a669afdd68165fab2b8bcc86c3b5120c
                                                            • Opcode Fuzzy Hash: 69cf89da5bfc63c55b2a86f9f1d08a66646c16740cbbeda139043dcc37bdf7b4
                                                            • Instruction Fuzzy Hash: FF212571504300DFDB15DF20D5D0B66BBA1FF84314F60C5ADE80A4B252C3BAD447CA61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690826620.0000000002BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BBD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2bbd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 568b0c4670fee1d71b6da60162333ccc6fd30586a2fdc199d02e977533a8f66c
                                                            • Instruction ID: 83a0fa0e7782ecbd5d4ecd35aa479d417a77de81fb9c2968a4d15398241ec906
                                                            • Opcode Fuzzy Hash: 568b0c4670fee1d71b6da60162333ccc6fd30586a2fdc199d02e977533a8f66c
                                                            • Instruction Fuzzy Hash: C721F671604245DFDB16DF10D5C0B7ABBA5FF84324F24C5A9E8490B242C3BED446CBA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690826620.0000000002BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BBD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2bbd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1bedb5baec4e161b2cd6e9d429d0bfc4c83234b5065c1e0d76284b50e76b3432
                                                            • Instruction ID: f0b26802af10d329cbbca5995c7c7a1d89f2be752dae16041c8f187dbba6c9d3
                                                            • Opcode Fuzzy Hash: 1bedb5baec4e161b2cd6e9d429d0bfc4c83234b5065c1e0d76284b50e76b3432
                                                            • Instruction Fuzzy Hash: 6921F571A04241EFDB16DF10D5C0B65BBA5FF84314F20C5ADE8894B252C37AD446CA61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690826620.0000000002BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BBD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2bbd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dab469fbfcf023409ae4fcac360ff6b27b1c5e6af84f5bda6c0a01af671152de
                                                            • Instruction ID: 834c8f5dd0ee1563f592e7946b1a67a32383a53879ce46f026a2941d5b406c99
                                                            • Opcode Fuzzy Hash: dab469fbfcf023409ae4fcac360ff6b27b1c5e6af84f5bda6c0a01af671152de
                                                            • Instruction Fuzzy Hash: 2E2181755093808FCB17CF20D9A4B15BF71EF45214F28C5EAD8498B6A7C37AD80ACB62
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690654363.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_12fd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                            • Instruction ID: 50ab353bcc55094d24546d29b723ced0e8db4ca22f9f8ada4add5e80ce901814
                                                            • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                            • Instruction Fuzzy Hash: 20119D76504284CFCB16CF54E5C4B16BF61FB84318F2486A9DA490B656C336D45ACBA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690654363.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_12fd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                            • Instruction ID: 7f21bae4d95140c7f17cf036eb108596e78744db54ede0b210a184043b7e5950
                                                            • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                            • Instruction Fuzzy Hash: D011CD76404284CFCB12CF54D5C4B56BF71FB84324F2486A9DA090B656C33AE456CBA2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690826620.0000000002BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BBD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2bbd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                            • Instruction ID: 803cbbc1b9ae5ee81d97f59453bc09a3373f3d41e957123e23d470abae5294ed
                                                            • Opcode Fuzzy Hash: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                            • Instruction Fuzzy Hash: FD118B75904280DFCB16CF10D5C4B65BBA1FF84318F24C6A9D8894B696C37AD44ACB61
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3690826620.0000000002BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BBD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2bbd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8fbc9ecfa64d6cd6169a34e6f0bd23febabaae063db22b202cb29621ee734798
                                                            • Instruction ID: ea166bfd60e26ed8b43cedc9f38584203948cf9959a4f79e64dd12fdb60cc580
                                                            • Opcode Fuzzy Hash: 8fbc9ecfa64d6cd6169a34e6f0bd23febabaae063db22b202cb29621ee734798
                                                            • Instruction Fuzzy Hash: B811B275508280CFCB12CF10D5C4B69FF61FF84324F24C6A9D8494B656C37AD406CBA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'q$4'q
                                                            • API String ID: 0-1467158625
                                                            • Opcode ID: b4380d76e879e18845e3753139c09d400705853ec51a21c8f76ac5c5f4dcab29
                                                            • Instruction ID: 280c17d180c629b6eb8770b1c8690bd33b69dd4f9b2b9b0dd4b3e013cea52880
                                                            • Opcode Fuzzy Hash: b4380d76e879e18845e3753139c09d400705853ec51a21c8f76ac5c5f4dcab29
                                                            • Instruction Fuzzy Hash: 2091F235E142499FDB01EBB8E4A4AEEBBB1FF85300F5400AAD144AF366DB319D05CB95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3691155548.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_2d90000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1cb650c2c7a4718cc8f5c135464171e1da84f170fc48ae0d623e4899d316f493
                                                            • Instruction ID: 22c64513c605b983bb9666ecca7fc01f53b4d619f7c96e955dd9c817a2703134
                                                            • Opcode Fuzzy Hash: 1cb650c2c7a4718cc8f5c135464171e1da84f170fc48ae0d623e4899d316f493
                                                            • Instruction Fuzzy Hash: 00A15A36A002098FCF15DFA4C89059EBBB6FF85300B25856AF805EB365DB71ED16CB90

                                                            Execution Graph

                                                            Execution Coverage:16.4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:28.3%
                                                            Total number of Nodes:53
                                                            Total number of Limit Nodes:6
                                                            execution_graph 23994 6798460 23995 6798467 23994->23995 23997 679846d 23994->23997 23995->23997 23999 67987ee 23995->23999 24000 6797b70 23995->24000 23998 6797b70 LdrInitializeThunk 23998->23999 23999->23997 23999->23998 24001 6797b82 24000->24001 24003 6797b87 24000->24003 24001->23999 24002 67982b1 LdrInitializeThunk 24002->24001 24003->24001 24003->24002 24004 114ced8 24005 114cee4 24004->24005 24012 67911c0 24005->24012 24019 67911b0 24005->24019 24006 114cf98 24026 67c8608 24006->24026 24033 67c85f8 24006->24033 24007 114d0b7 24013 67911e2 24012->24013 24014 67912ae 24013->24014 24017 6797b70 LdrInitializeThunk 24013->24017 24040 6797d90 24013->24040 24046 6797b6e 24013->24046 24052 6798174 24013->24052 24014->24006 24017->24014 24020 67911e2 24019->24020 24021 67912ae 24020->24021 24022 6797b6e 2 API calls 24020->24022 24023 6797d90 2 API calls 24020->24023 24024 6797b70 LdrInitializeThunk 24020->24024 24025 6798174 2 API calls 24020->24025 24021->24006 24022->24021 24023->24021 24024->24021 24025->24021 24027 67c862a 24026->24027 24028 67c873c 24027->24028 24029 6797b6e 2 API calls 24027->24029 24030 6797d90 2 API calls 24027->24030 24031 6797b70 LdrInitializeThunk 24027->24031 24032 6798174 2 API calls 24027->24032 24028->24007 24029->24028 24030->24028 24031->24028 24032->24028 24034 67c85a6 24033->24034 24034->24033 24035 67c873c 24034->24035 24036 6797b6e 2 API calls 24034->24036 24037 6797d90 2 API calls 24034->24037 24038 6797b70 LdrInitializeThunk 24034->24038 24039 6798174 2 API calls 24034->24039 24035->24007 24036->24035 24037->24035 24038->24035 24039->24035 24045 6797dc1 24040->24045 24041 6797f21 24041->24014 24042 679816c LdrInitializeThunk 24042->24041 24044 6797b70 LdrInitializeThunk 24044->24045 24045->24041 24045->24042 24045->24044 24050 6797b75 24046->24050 24047 6797b82 24047->24014 24048 679816c LdrInitializeThunk 24048->24047 24050->24047 24050->24048 24051 6797b70 LdrInitializeThunk 24050->24051 24051->24050 24057 679802b 24052->24057 24053 679816c LdrInitializeThunk 24055 67982c9 24053->24055 24055->24014 24056 6797b70 LdrInitializeThunk 24056->24057 24057->24053 24057->24056

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 147 1146730-1146766 274 1146768 call 1146730 147->274 275 1146768 call 1146880 147->275 276 1146768 call 1146108 147->276 148 114676e-1146774 149 11467c4-11467c8 148->149 150 1146776-114677a 148->150 151 11467df-11467f3 149->151 152 11467ca-11467d9 149->152 153 114677c-1146781 150->153 154 1146789-1146790 150->154 157 11467fb-1146802 151->157 271 11467f5 call 1149851 151->271 272 11467f5 call 1149858 151->272 155 1146805-114680f 152->155 156 11467db-11467dd 152->156 153->154 158 1146866-11468a3 154->158 159 1146796-114679d 154->159 161 1146811-1146817 155->161 162 1146819-114681d 155->162 156->157 168 11468a5-11468ab 158->168 169 11468ae-11468ce 158->169 159->149 160 114679f-11467a3 159->160 166 11467a5-11467aa 160->166 167 11467b2-11467b9 160->167 163 1146825-114685f 161->163 162->163 165 114681f 162->165 163->158 165->163 166->167 167->158 170 11467bf-11467c2 167->170 168->169 175 11468d5-11468dc 169->175 176 11468d0 169->176 170->157 179 11468de-11468e9 175->179 178 1146c64-1146c6d 176->178 180 1146c75-1146c82 179->180 181 11468ef-1146902 179->181 186 1146904-1146912 181->186 187 1146918-1146933 181->187 186->187 190 1146bec-1146bf3 186->190 191 1146935-114693b 187->191 192 1146957-114695a 187->192 190->178 195 1146bf5-1146bf7 190->195 193 1146944-1146947 191->193 194 114693d 191->194 196 1146ab4-1146aba 192->196 197 1146960-1146963 192->197 199 114697a-1146980 193->199 200 1146949-114694c 193->200 194->193 194->196 198 1146ba6-1146ba9 194->198 194->199 201 1146c06-1146c0c 195->201 202 1146bf9-1146bfe 195->202 196->198 203 1146ac0-1146ac5 196->203 197->196 204 1146969-114696f 197->204 209 1146c70 198->209 210 1146baf-1146bb5 198->210 211 1146986-1146988 199->211 212 1146982-1146984 199->212 205 11469e6-11469ec 200->205 206 1146952 200->206 201->180 207 1146c0e-1146c13 201->207 202->201 203->198 204->196 208 1146975 204->208 205->198 215 11469f2-11469f8 205->215 206->198 213 1146c15-1146c1a 207->213 214 1146c58-1146c5b 207->214 208->198 209->180 216 1146bb7-1146bbf 210->216 217 1146bda-1146bde 210->217 218 1146992-114699b 211->218 212->218 213->209 223 1146c1c 213->223 214->209 222 1146c5d-1146c62 214->222 224 11469fe-1146a00 215->224 225 11469fa-11469fc 215->225 216->180 226 1146bc5-1146bd4 216->226 217->190 221 1146be0-1146be6 217->221 219 114699d-11469a8 218->219 220 11469ae-11469d6 218->220 219->198 219->220 246 11469dc-11469e1 220->246 247 1146aca-1146b00 220->247 221->179 221->190 222->178 222->195 227 1146c23-1146c28 223->227 228 1146a0a-1146a21 224->228 225->228 226->187 226->217 232 1146c4a-1146c4c 227->232 233 1146c2a-1146c2c 227->233 239 1146a23-1146a3c 228->239 240 1146a4c-1146a73 228->240 232->209 235 1146c4e-1146c51 232->235 236 1146c2e-1146c33 233->236 237 1146c3b-1146c41 233->237 235->214 236->237 237->180 238 1146c43-1146c48 237->238 238->232 242 1146c1e-1146c21 238->242 239->247 250 1146a42-1146a47 239->250 240->209 252 1146a79-1146a7c 240->252 242->209 242->227 246->247 254 1146b02-1146b06 247->254 255 1146b0d-1146b15 247->255 250->247 252->209 253 1146a82-1146aab 252->253 253->247 270 1146aad-1146ab2 253->270 257 1146b25-1146b29 254->257 258 1146b08-1146b0b 254->258 255->209 256 1146b1b-1146b20 255->256 256->198 260 1146b48-1146b4c 257->260 261 1146b2b-1146b31 257->261 258->255 258->257 263 1146b56-1146b75 call 1146e58 260->263 264 1146b4e-1146b54 260->264 261->260 262 1146b33-1146b3b 261->262 262->209 266 1146b41-1146b46 262->266 267 1146b7b-1146b7f 263->267 264->263 264->267 266->198 267->198 268 1146b81-1146b9d 267->268 268->198 270->247 271->157 272->157 274->148 275->148 276->148
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (oq$(oq$(oq$,q$,q
                                                            • API String ID: 0-189141485
                                                            • Opcode ID: b7f9b888c0d0568c09937a16f59afd3ba6c5df30880b7614806538786e204eef
                                                            • Instruction ID: fbca320e354536f5dd163c4bb25b7dd13121a1e20173207d75abbf15a61d9479
                                                            • Opcode Fuzzy Hash: b7f9b888c0d0568c09937a16f59afd3ba6c5df30880b7614806538786e204eef
                                                            • Instruction Fuzzy Hash: EB028F70E00209DFDB19CFA9C984AADBBF6FF8A709F158469E505AB261D730EC41CB51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (oq$4'q
                                                            • API String ID: 0-1336004174
                                                            • Opcode ID: 2f1f37f21ac8cc1acdb97a04563f85c8b91f59a0f754c96c0b3675980b7fa38a
                                                            • Instruction ID: 697ea7a3276117d5e2e1161a40f41ae3ea4d5251c32a61cf51cebc1da5021f8b
                                                            • Opcode Fuzzy Hash: 2f1f37f21ac8cc1acdb97a04563f85c8b91f59a0f754c96c0b3675980b7fa38a
                                                            • Instruction Fuzzy Hash: A072A471A40209CFCB19CF68D984AAEBBF2FF88704F158559E9069B3A1D730ED51CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (oq$Hq
                                                            • API String ID: 0-2917151738
                                                            • Opcode ID: 7b06b7f9c274d5f639e9f882223b4f2ae6a309566af791b6557a4abaeb3b96b1
                                                            • Instruction ID: bacbeffd278449695fb04221f897c2c5995cd2b0c2e01efaf49e0ab5b15ab550
                                                            • Opcode Fuzzy Hash: 7b06b7f9c274d5f639e9f882223b4f2ae6a309566af791b6557a4abaeb3b96b1
                                                            • Instruction Fuzzy Hash: 6F12AE70A002199FDB18DF69C954BAEBBF6FF89704F148529E40ADB395EB309D41CB90

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2382 114b328-114b33b 2383 114b341-114b34a 2382->2383 2384 114b47a-114b481 2382->2384 2385 114b484 2383->2385 2386 114b350-114b354 2383->2386 2391 114b489-114b491 2385->2391 2387 114b356 2386->2387 2388 114b36e-114b375 2386->2388 2389 114b359-114b364 2387->2389 2388->2384 2390 114b37b-114b388 2388->2390 2389->2385 2392 114b36a-114b36c 2389->2392 2390->2384 2395 114b38e-114b3a1 2390->2395 2396 114b493-114b4b0 2391->2396 2397 114b43f-114b44b 2391->2397 2392->2388 2392->2389 2400 114b3a6-114b3ae 2395->2400 2401 114b3a3 2395->2401 2398 114b4b2-114b4ca 2396->2398 2399 114b4dc 2396->2399 2406 114b470-114b473 2397->2406 2407 114b44d-114b453 2397->2407 2418 114b4d3-114b4d6 2398->2418 2419 114b4cc-114b4d1 2398->2419 2403 114b4de-114b4e2 2399->2403 2404 114b3b0-114b3b6 2400->2404 2405 114b41b-114b41d 2400->2405 2401->2400 2404->2405 2410 114b3b8-114b3be 2404->2410 2405->2384 2409 114b41f-114b425 2405->2409 2406->2385 2412 114b475-114b478 2406->2412 2407->2391 2411 114b455-114b469 2407->2411 2409->2384 2413 114b427-114b431 2409->2413 2410->2391 2414 114b3c4-114b3dc 2410->2414 2411->2391 2421 114b46b 2411->2421 2412->2384 2412->2413 2413->2391 2416 114b433-114b439 2413->2416 2425 114b3de-114b3e4 2414->2425 2426 114b409-114b40c 2414->2426 2416->2397 2422 114b4e3-114b520 2418->2422 2423 114b4d8-114b4da 2418->2423 2419->2403 2421->2406 2430 114b527-114b604 call 1143908 call 1143428 2422->2430 2431 114b522 2422->2431 2423->2398 2423->2399 2425->2391 2428 114b3ea-114b3fe 2425->2428 2426->2385 2429 114b40e-114b411 2426->2429 2428->2391 2435 114b404 2428->2435 2429->2385 2432 114b413-114b419 2429->2432 2444 114b606 2430->2444 2445 114b60b-114b62c call 1144dc8 2430->2445 2431->2430 2432->2404 2432->2405 2435->2426 2444->2445 2447 114b631-114b63c 2445->2447 2448 114b643-114b647 2447->2448 2449 114b63e 2447->2449 2450 114b64c-114b653 2448->2450 2451 114b649-114b64a 2448->2451 2449->2448 2453 114b655 2450->2453 2454 114b65a-114b668 2450->2454 2452 114b66b-114b6af 2451->2452 2458 114b715-114b72c 2452->2458 2453->2454 2454->2452 2460 114b6b1-114b6c7 2458->2460 2461 114b72e-114b753 2458->2461 2465 114b6f1 2460->2465 2466 114b6c9-114b6d5 2460->2466 2467 114b755-114b76a 2461->2467 2468 114b76b 2461->2468 2471 114b6f7-114b714 2465->2471 2469 114b6d7-114b6dd 2466->2469 2470 114b6df-114b6e5 2466->2470 2467->2468 2474 114b76c 2468->2474 2472 114b6ef 2469->2472 2470->2472 2471->2458 2472->2471 2474->2474
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: f8c313634041719464fbb902cc10ff7591da65b669a578a7140f782c79351ab5
                                                            • Instruction ID: 3f1b752148923c9972c8c30b542029358bf8434732017f6012f2308d43c8a197
                                                            • Opcode Fuzzy Hash: f8c313634041719464fbb902cc10ff7591da65b669a578a7140f782c79351ab5
                                                            • Instruction Fuzzy Hash: B3E11774E04619CFDB18CFA9C984A9DBBB2BF49710F198069E809AB361DB30EC41CF54

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2589 67c8b58-67c8b64 2590 67c8bdb-67c8be6 2589->2590 2591 67c8b66 2589->2591 2592 67c8bee 2590->2592 2593 67c8be8-67c8bed 2590->2593 2596 67c8b85 2591->2596 2594 67c8bf6 2592->2594 2595 67c8bf0-67c8bf5 2592->2595 2593->2592 2597 67c8bfe 2594->2597 2598 67c8bf8-67c8bfa 2594->2598 2595->2594 2599 67c8b9e-67c8bb8 2596->2599 2603 67c8c06 2597->2603 2604 67c8c00-67c8c01 2597->2604 2601 67c8bfc 2598->2601 2602 67c8c02 2598->2602 2605 67c8bba-67c8bbf 2599->2605 2606 67c8bc0-67c8bc6 2599->2606 2601->2596 2607 67c8bfd 2601->2607 2608 67c8c0a 2602->2608 2609 67c8c04-67c8c05 2602->2609 2610 67c8c0e 2603->2610 2611 67c8c08-67c8c09 2603->2611 2604->2602 2605->2606 2607->2597 2612 67c8c0c-67c8c0d 2608->2612 2613 67c8c12 2608->2613 2609->2603 2614 67c8c16 2610->2614 2615 67c8c10-67c8c11 2610->2615 2611->2608 2612->2610 2616 67c8c1a 2613->2616 2617 67c8c14 2613->2617 2619 67c8c1e 2614->2619 2620 67c8c18-67c8c19 2614->2620 2615->2613 2622 67c8c1c-67c8c1d 2616->2622 2623 67c8c22 2616->2623 2617->2599 2621 67c8c15 2617->2621 2624 67c8c26 2619->2624 2625 67c8c20-67c8c21 2619->2625 2620->2616 2621->2614 2622->2619 2626 67c8c2a 2623->2626 2627 67c8c24-67c8c25 2623->2627 2628 67c8c2e 2624->2628 2629 67c8c28-67c8c29 2624->2629 2625->2623 2630 67c8c2c-67c8c2d 2626->2630 2631 67c8c32 2626->2631 2627->2624 2632 67c8c36 2628->2632 2633 67c8c30-67c8c31 2628->2633 2629->2626 2630->2628 2634 67c8c3a 2631->2634 2635 67c8c34-67c8c35 2631->2635 2636 67c8c3e 2632->2636 2637 67c8c38-67c8c39 2632->2637 2633->2631 2638 67c8c3c-67c8c3d 2634->2638 2639 67c8c42 2634->2639 2635->2632 2640 67c8c46 2636->2640 2641 67c8c40-67c8c41 2636->2641 2637->2634 2638->2636 2642 67c8c4a 2639->2642 2643 67c8c44-67c8c45 2639->2643 2644 67c8c4e 2640->2644 2645 67c8c49 2640->2645 2641->2639 2646 67c8c4d 2642->2646 2647 67c8c52 2642->2647 2643->2640 2648 67c8c56 2644->2648 2649 67c8c50-67c8c51 2644->2649 2645->2642 2646->2644 2650 67c8c5a 2647->2650 2651 67c8c54 2647->2651 2652 67c8c5e-67c8c5f 2648->2652 2653 67c8c58-67c8c59 2648->2653 2649->2647 2654 67c8c5c 2650->2654 2655 67c8c62-67c8c88 2650->2655 2651->2648 2652->2655 2653->2650 2654->2652 2657 67c8c8f-67c8d33 2655->2657 2658 67c8c8a 2655->2658 2662 67c8d35-67c8d3c 2657->2662 2663 67c8d41-67c8d92 2657->2663 2658->2657 2664 67c8f9c-67c8fba 2662->2664 2671 67c8e64-67c8e7b 2663->2671 2673 67c8d97-67c8dc4 2671->2673 2674 67c8e81-67c8ea6 2671->2674 2681 67c8de5 2673->2681 2682 67c8dc6-67c8dcf 2673->2682 2678 67c8ebe 2674->2678 2679 67c8ea8-67c8ebd 2674->2679 2678->2664 2679->2678 2686 67c8de8-67c8e09 2681->2686 2684 67c8dd6-67c8dd9 2682->2684 2685 67c8dd1-67c8dd4 2682->2685 2687 67c8de3 2684->2687 2685->2687 2690 67c8e0b-67c8e47 2686->2690 2691 67c8e62-67c8e63 2686->2691 2687->2686 2695 67c8e52-67c8e61 2690->2695 2691->2671 2695->2691
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: 46f67718d53be3f1c6d071c8e00cef9356f81a61690c7f368db0df975af87d62
                                                            • Instruction ID: 4761b6d9ab594667b5d73cd052594e0b8380e0ba647699dac9f3da59774404de
                                                            • Opcode Fuzzy Hash: 46f67718d53be3f1c6d071c8e00cef9356f81a61690c7f368db0df975af87d62
                                                            • Instruction Fuzzy Hash: B2C18770D01358CFDBA6CFA9C8586ADBFB2BF89310F2486AEC459AB245D7305841CF52

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2836 114bbd2-114bbd5 2837 114bbd7-114bbd9 2836->2837 2838 114bb83 2836->2838 2839 114bb87 2837->2839 2840 114bbdb-114bc00 2837->2840 2841 114bbbd-114bbc8 2838->2841 2839->2841 2842 114bc07-114bce4 call 1143908 call 1143428 2840->2842 2843 114bc02 2840->2843 2853 114bce6 2842->2853 2854 114bceb-114bd0c call 1144dc8 2842->2854 2843->2842 2853->2854 2856 114bd11-114bd1c 2854->2856 2857 114bd23-114bd27 2856->2857 2858 114bd1e 2856->2858 2859 114bd2c-114bd33 2857->2859 2860 114bd29-114bd2a 2857->2860 2858->2857 2862 114bd35 2859->2862 2863 114bd3a-114bd48 2859->2863 2861 114bd4b-114bd8f 2860->2861 2867 114bdf5-114be0c 2861->2867 2862->2863 2863->2861 2869 114bd91-114bda7 2867->2869 2870 114be0e-114be33 2867->2870 2874 114bdd1 2869->2874 2875 114bda9-114bdb5 2869->2875 2876 114be35-114be4a 2870->2876 2877 114be4b 2870->2877 2880 114bdd7-114bdf4 2874->2880 2878 114bdb7-114bdbd 2875->2878 2879 114bdbf-114bdc5 2875->2879 2876->2877 2881 114bdcf 2878->2881 2879->2881 2880->2867 2881->2880
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: baa9f30452314a6ea6d288fedac8bbb6ec44d66f9c43a4db397b7006e6d25691
                                                            • Instruction ID: bb8bfcf22341d99b11e5f854b94d67f31d644ca7cb0546cfa68780ee55ec252c
                                                            • Opcode Fuzzy Hash: baa9f30452314a6ea6d288fedac8bbb6ec44d66f9c43a4db397b7006e6d25691
                                                            • Instruction Fuzzy Hash: 4F81E774E04218CFEB18DFAAD984B9DBBF2BF88314F148069D459AB365DB309941CF15

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2931 114c470-114c4a0 2932 114c4a7-114c584 call 1143908 call 1143428 2931->2932 2933 114c4a2 2931->2933 2943 114c586 2932->2943 2944 114c58b-114c5ac call 1144dc8 2932->2944 2933->2932 2943->2944 2946 114c5b1-114c5bc 2944->2946 2947 114c5c3-114c5c7 2946->2947 2948 114c5be 2946->2948 2949 114c5cc-114c5d3 2947->2949 2950 114c5c9-114c5ca 2947->2950 2948->2947 2952 114c5d5 2949->2952 2953 114c5da-114c5e8 2949->2953 2951 114c5eb-114c62f 2950->2951 2957 114c695-114c6ac 2951->2957 2952->2953 2953->2951 2959 114c631-114c647 2957->2959 2960 114c6ae-114c6d3 2957->2960 2964 114c671 2959->2964 2965 114c649-114c655 2959->2965 2969 114c6d5-114c6ea 2960->2969 2970 114c6eb 2960->2970 2968 114c677-114c694 2964->2968 2966 114c657-114c65d 2965->2966 2967 114c65f-114c665 2965->2967 2971 114c66f 2966->2971 2967->2971 2968->2957 2969->2970 2971->2968
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: 882d4edc15af459dc9b69e07d67b954af6da9d2200e35c0f5092c0e4b49510bc
                                                            • Instruction ID: a9966b55b1526df1b9b39db3a96fb4a985b0c7a7a123911b2837f5494b0da96f
                                                            • Opcode Fuzzy Hash: 882d4edc15af459dc9b69e07d67b954af6da9d2200e35c0f5092c0e4b49510bc
                                                            • Instruction Fuzzy Hash: BF81AF74E012188FEB18DFAAD984B9DBBF2BF88310F14D069E419AB365DB709941CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: 6636804edce6d477d01efbf5f8c1e7525f2f65ee8297d3b97de4fcecf413f87a
                                                            • Instruction ID: 9d3d7c97b932834e3ee0b142eb234b5f6f1a6c9b31f7b8167bfba80373575bdf
                                                            • Opcode Fuzzy Hash: 6636804edce6d477d01efbf5f8c1e7525f2f65ee8297d3b97de4fcecf413f87a
                                                            • Instruction Fuzzy Hash: 1F81D374E01218DFEB18DFAAD984B9DBBF2BF88310F148069E459AB365DB309941CF51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2885 1144ad9-1144b08 2886 1144b0f-1144bec call 1143908 call 1143428 2885->2886 2887 1144b0a 2885->2887 2897 1144bf3-1144c11 2886->2897 2898 1144bee 2886->2898 2887->2886 2928 1144c14 call 1144dc8 2897->2928 2929 1144c14 call 1144db9 2897->2929 2930 1144c14 call 1144f09 2897->2930 2898->2897 2899 1144c1a-1144c25 2900 1144c27 2899->2900 2901 1144c2c-1144c30 2899->2901 2900->2901 2902 1144c35-1144c3c 2901->2902 2903 1144c32-1144c33 2901->2903 2905 1144c43-1144c51 2902->2905 2906 1144c3e 2902->2906 2904 1144c54-1144c98 2903->2904 2910 1144cfe-1144d15 2904->2910 2905->2904 2906->2905 2912 1144d17-1144d3c 2910->2912 2913 1144c9a-1144cb0 2910->2913 2919 1144d54 2912->2919 2920 1144d3e-1144d53 2912->2920 2917 1144cb2-1144cbe 2913->2917 2918 1144cda 2913->2918 2921 1144cc0-1144cc6 2917->2921 2922 1144cc8-1144cce 2917->2922 2923 1144ce0-1144cfd 2918->2923 2920->2919 2924 1144cd8 2921->2924 2922->2924 2923->2910 2924->2923 2928->2899 2929->2899 2930->2899
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: 8c8e29773a2c29ef75c137448ba6ef95f7804b795f5f8a69de8c0ad36c759703
                                                            • Instruction ID: 84d920bf79d80532b9b887f8e3ea7cd5cb65643e85ab265e4ff19b3f9b606993
                                                            • Opcode Fuzzy Hash: 8c8e29773a2c29ef75c137448ba6ef95f7804b795f5f8a69de8c0ad36c759703
                                                            • Instruction Fuzzy Hash: E281B574E00218DFEB18DFAAD984B9DBBF2BF88310F148069D459AB365DB709941CF15
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: 657833ec41a056e95f2bb56c3c974420715bae707e6824429d1f2d91133cc2f5
                                                            • Instruction ID: f0154fd27ebe7de822571da25a150969744f039bf01dc9602aac953e19d99b02
                                                            • Opcode Fuzzy Hash: 657833ec41a056e95f2bb56c3c974420715bae707e6824429d1f2d91133cc2f5
                                                            • Instruction Fuzzy Hash: E781B274E01218CFEB18DFAAD984B9DBBF2BF88310F148069E459AB365DB709941CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: 7ff64a1613ff951db03445d2c52101ee20671ccbc42eeaa004dcb47ef9f9268a
                                                            • Instruction ID: 15402b5b3c52095d8d1c9346ca5997e19671647200a4e1a621c1279ba52e0539
                                                            • Opcode Fuzzy Hash: 7ff64a1613ff951db03445d2c52101ee20671ccbc42eeaa004dcb47ef9f9268a
                                                            • Instruction Fuzzy Hash: 9D81B374E01218CFEB18DFAAD984B9DBBF2BF88310F148069E419AB365DB709941CF55
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: 6f38da56a764b7f4ae8b31e1d0898c2a847e00243cca5094ccfabbd3a750c28e
                                                            • Instruction ID: 2e6f8ea49840023a1d706ffef196cc8abaa394ba29d1b3003cd39a9486de52a6
                                                            • Opcode Fuzzy Hash: 6f38da56a764b7f4ae8b31e1d0898c2a847e00243cca5094ccfabbd3a750c28e
                                                            • Instruction Fuzzy Hash: BF81B574E01218CFEB18DFAAD984B9DBBF2BF89300F148069E459AB365DB309941CF51
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: PHq$PHq
                                                            • API String ID: 0-1274609152
                                                            • Opcode ID: e3266e0a40fbffffd458c49beb9f55b4c2f1a51efb61ddd8d11624e09cebd855
                                                            • Instruction ID: ffe2c9282af1522a66ba80d1cf58b1158ce06853ba717794832e6ebe744b5f81
                                                            • Opcode Fuzzy Hash: e3266e0a40fbffffd458c49beb9f55b4c2f1a51efb61ddd8d11624e09cebd855
                                                            • Instruction Fuzzy Hash: DA61C574E046089FDB18DFAAD984A9DFBF2BF88300F14C069D419AB365DB749841CF15
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ca51e8785eaf2883fb6921ceea1ddab2d6c6ef6c168192b73253ce477d9a88b2
                                                            • Instruction ID: c7c7fca3587cf8561fe31dfb4a8966b5c03f78e43363040305f86050689daa53
                                                            • Opcode Fuzzy Hash: ca51e8785eaf2883fb6921ceea1ddab2d6c6ef6c168192b73253ce477d9a88b2
                                                            • Instruction Fuzzy Hash: 3D223974E002198FDF58DFA8D884BADBBF2BF85300F1485A9D449AB395DB349941CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 98925d90c3942312b23810810a5043b6217aa896ed604072a40192d8635cd436
                                                            • Instruction ID: 009e972ceff8e6020ada0ead1132c0579dd7feb6c5638245cc9ebe71c8783883
                                                            • Opcode Fuzzy Hash: 98925d90c3942312b23810810a5043b6217aa896ed604072a40192d8635cd436
                                                            • Instruction Fuzzy Hash: 87827174E012288FEBA4DF65C998BDDBBB2BF49300F1481E9944DAB255DB309E81CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8cbc401b3b74eefeda5ba0a3c4dea866ac2677049d7e9cfd3b7c3d7135baf480
                                                            • Instruction ID: 917e6bfb52adab0c9cecce581d865e6a7333e79409fd16836a52d1100780f8b0
                                                            • Opcode Fuzzy Hash: 8cbc401b3b74eefeda5ba0a3c4dea866ac2677049d7e9cfd3b7c3d7135baf480
                                                            • Instruction Fuzzy Hash: 6E72CF74E002298FDB68DF69C994BDDBBB2BB49300F1481E9D449AB355DB349E82CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8594069eb556d81564c1b62774c5a7cd84c42c6e8ae3f66568c8d348e15012b8
                                                            • Instruction ID: fbf5760744063e984278dd513a9d45bbe7c90cf63691f5f112c16def212473ff
                                                            • Opcode Fuzzy Hash: 8594069eb556d81564c1b62774c5a7cd84c42c6e8ae3f66568c8d348e15012b8
                                                            • Instruction Fuzzy Hash: CEE1DF74E00218CFEB64DFA5D944B9DBBF2BF89304F2080A9D409AB394DB355A85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bbad122a815e8dee3513b0837a2ac6ab1d43dc05e1c59f5922504e9bc1314360
                                                            • Instruction ID: fd3101be80ee93faf37a95293c1e001876c40863187c349eeed96bbda279fa81
                                                            • Opcode Fuzzy Hash: bbad122a815e8dee3513b0837a2ac6ab1d43dc05e1c59f5922504e9bc1314360
                                                            • Instruction Fuzzy Hash: 1DC19F78E00218CFDB54DFA5D954BADBBB2BF89304F2081A9D809AB355DB359A81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5b389509afb38114ee19527924092e0d43441b772b98b485e48a5b49357db60a
                                                            • Instruction ID: 08bff92e356fac52f813cf092915a7948f4268b3932a418bca071b92823f3d57
                                                            • Opcode Fuzzy Hash: 5b389509afb38114ee19527924092e0d43441b772b98b485e48a5b49357db60a
                                                            • Instruction Fuzzy Hash: DBC19F78E00218CFDB54DFA5D954BADBBB2BF89304F2081A9D809AB355DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a62c94118fa9178015bec539a403d1ac3c1a3256446ffdb6ec0fd599238fb309
                                                            • Instruction ID: 3e9f2d1585068f5a38199d4baacf268648c51edc06a39cae878e65aacd7e0b4e
                                                            • Opcode Fuzzy Hash: a62c94118fa9178015bec539a403d1ac3c1a3256446ffdb6ec0fd599238fb309
                                                            • Instruction Fuzzy Hash: 2FA12470E002098FEB24DFA9D588BEDBBF1FF88314F248269D448AB291DB705985CF54
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ce44ce30fd0689ee38d97ddcd29451536a7830f4c4d0001be937ef3ac1e14ec5
                                                            • Instruction ID: 777aa1cc0a758340ae15bf48ebc1bbe272cdc27883ea358c7043887a82b35f6c
                                                            • Opcode Fuzzy Hash: ce44ce30fd0689ee38d97ddcd29451536a7830f4c4d0001be937ef3ac1e14ec5
                                                            • Instruction Fuzzy Hash: 8FA1F470D002098FEB24DFA9D948BEDBBF1FF88314F248269D448AB291DB705985CF65
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 53d5aa85f3a382cea46767706205044df82c80ecf11aed5c19f99b58f56f272c
                                                            • Instruction ID: f396cf52c9a4771f8bee541ff962ff6626ffb700dc0f304ef066770b316ab3c4
                                                            • Opcode Fuzzy Hash: 53d5aa85f3a382cea46767706205044df82c80ecf11aed5c19f99b58f56f272c
                                                            • Instruction Fuzzy Hash: 22A1B074E012288FEB68DF6AC944B9DBBF2BF89310F14C0AAD40CA7254DB745A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 193d9779effcb322a6278bcc3091e3fc209a9f414b67e203cb17de4d8f21bf5d
                                                            • Instruction ID: ae7622f9fdddc0984e854ad50b7098887f19b5adc43ea0223358e438bc0bbb77
                                                            • Opcode Fuzzy Hash: 193d9779effcb322a6278bcc3091e3fc209a9f414b67e203cb17de4d8f21bf5d
                                                            • Instruction Fuzzy Hash: 65A1AF74E012288FEB68CF6AC945B9DBBF2BF89310F14C0AAD408A7255DB745A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 761bfc371eb3f028f080f98592294b1f283a5e30bba94cedf7c779df56538cc8
                                                            • Instruction ID: f84bbe9df05e8fec3f6ebfae63abd5bb1b96e1fbb0324588c89ff13733f2fb99
                                                            • Opcode Fuzzy Hash: 761bfc371eb3f028f080f98592294b1f283a5e30bba94cedf7c779df56538cc8
                                                            • Instruction Fuzzy Hash: 5FA1A3B4E012188FEB68CF6AD944B9DBBF2AF89310F14C0AAD40CA7255DB745A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bd8cdd886e847290f2ecef6c4e20bfd5aeab05923ec28efdce8294ae3d91a5e3
                                                            • Instruction ID: 363ed794b82f95a7f1c11e646dfface99898e4cb76ba3d46686f09facd302831
                                                            • Opcode Fuzzy Hash: bd8cdd886e847290f2ecef6c4e20bfd5aeab05923ec28efdce8294ae3d91a5e3
                                                            • Instruction Fuzzy Hash: A6A1A274E016188FEB68CF6AC944B9DBBF2BF89311F14C0AAD408A7255DB745A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 45896df4f0f8fa58a513f736bb9adc5a0115924454788bbe04394ac688afdb8f
                                                            • Instruction ID: dbd38b5e9a1129c49a576da790907e8548d5192146d62ebe0583c63d9f55dea6
                                                            • Opcode Fuzzy Hash: 45896df4f0f8fa58a513f736bb9adc5a0115924454788bbe04394ac688afdb8f
                                                            • Instruction Fuzzy Hash: 43A1A274E012288FEB68CF6AD944B9DBBF2BF89310F14C0AAD40DA7255DB345A85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74c183006f11b14acf7ac9e22ff14cb6d7f03e4b723716f424a26e12d384e060
                                                            • Instruction ID: cf13158c94a9ab17d12efcccf3181660893d0367dd67fe630de7ac61f6c4382b
                                                            • Opcode Fuzzy Hash: 74c183006f11b14acf7ac9e22ff14cb6d7f03e4b723716f424a26e12d384e060
                                                            • Instruction Fuzzy Hash: F6A1B274E012288FEB68CF6AC944B9DBBF2BF89310F14C1AAD40DA7255DB345A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b0a7c12f5e5d61a273b2b9b2721032cc358674a1b11b2d9036fae8d7343633f4
                                                            • Instruction ID: 62ce056e306a8420d31a13ccf7d2c996742c862b0ac25a7b07b78dd384747fec
                                                            • Opcode Fuzzy Hash: b0a7c12f5e5d61a273b2b9b2721032cc358674a1b11b2d9036fae8d7343633f4
                                                            • Instruction Fuzzy Hash: 68A1A174E012288FEB68CF6AC944B9DFBF2BF89311F14C1AAD408A7255DB745A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d21109da267e73cc569cde2f78f0603c88f9e28418b4fc2b4070052f85a8e04
                                                            • Instruction ID: ccb39414a0aeea333a0749abf2f0705607bd1709dadb179e94756a5acca31c9e
                                                            • Opcode Fuzzy Hash: 6d21109da267e73cc569cde2f78f0603c88f9e28418b4fc2b4070052f85a8e04
                                                            • Instruction Fuzzy Hash: 0CA19175E012288FEB68DF6AC944B9DBBF2AF89310F14C0AAD408A7255DB745A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8edf8353064e763a3e9db4dee6af4b761632ad4a05e3214be52affb6591b1e73
                                                            • Instruction ID: 817fc7a5b988686a47d697f01f763b6d71825d346755721ff4904c95de62b585
                                                            • Opcode Fuzzy Hash: 8edf8353064e763a3e9db4dee6af4b761632ad4a05e3214be52affb6591b1e73
                                                            • Instruction Fuzzy Hash: 89A1AF74E002288FEB68DF6AC945B9DFBF2BF89310F14C1AAD408A7254DB345A85CF11
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 75a4eb15404193e09462295144b9879b64bd1f36967cad459d7b80be11c80c6b
                                                            • Instruction ID: 0779dcdf8788505a3f8c0993fffa2ea06ff835d00f25e94500e64b2ed5f5fbc8
                                                            • Opcode Fuzzy Hash: 75a4eb15404193e09462295144b9879b64bd1f36967cad459d7b80be11c80c6b
                                                            • Instruction Fuzzy Hash: C891E274D002098FEB54DFA8D588BACBBF1FF48314F208269E449AB291DB709985CF64
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8d91ae45350040cd122d8afa69c7bb5765522de65fb9f2ed8efdb098863da153
                                                            • Instruction ID: e556b6dbd8ab9f78dad1a133ddb3b2b03f512c9045619c67dc8fc059deb3dd1e
                                                            • Opcode Fuzzy Hash: 8d91ae45350040cd122d8afa69c7bb5765522de65fb9f2ed8efdb098863da153
                                                            • Instruction Fuzzy Hash: E591C7B1D006588FEB68CF6AC945B9DBBB2BF89310F14C0EAD40CA7255DB315A85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 638d9f484d34d5a8e7bb80789865752e4f58c2a91689f55c324a822f7e15ae31
                                                            • Instruction ID: fe8a93cc7373bae9f9f05375135ea640450676a4bad55efaa7fe2d930093ff27
                                                            • Opcode Fuzzy Hash: 638d9f484d34d5a8e7bb80789865752e4f58c2a91689f55c324a822f7e15ae31
                                                            • Instruction Fuzzy Hash: 4981A474E412289FDB64DF29D954BEDBBB2BF89300F1081EAD849A7254DB305E81CF40
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: beb012dad05cbcc29304daf64f2bfef9174aa4ed407ae092fe3685a69d9f2294
                                                            • Instruction ID: 14ba477b63b92796d1ffacced5bf354ac8041579c6a4c68d919734c4856c41ee
                                                            • Opcode Fuzzy Hash: beb012dad05cbcc29304daf64f2bfef9174aa4ed407ae092fe3685a69d9f2294
                                                            • Instruction Fuzzy Hash: 8A717471E01628CFEB68CF6AC944B9DFAF2AF89310F14C1AAD40DA7255DB344A85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5c870b9e9a65e27b837223f76f79645ef47b2541b82d1a68c7411cf2ddbd3dfe
                                                            • Instruction ID: 6c5f751ad0936f46a169d1f08bc5fa528cacffa8419b9fc6ae4e4d50ac217e51
                                                            • Opcode Fuzzy Hash: 5c870b9e9a65e27b837223f76f79645ef47b2541b82d1a68c7411cf2ddbd3dfe
                                                            • Instruction Fuzzy Hash: B17183B1E006188FEB68CF6AC944B9DFAF2AF89301F14C0AAD40DA7255DB344A85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ceac9f78c0b0937cc6c88d3f8efab5819ed4b99ff05f12884010e95d2f2dc959
                                                            • Instruction ID: abcdef5399c7938d2dd7fa99b09b31be7190a005a304755988e31b06be0a5762
                                                            • Opcode Fuzzy Hash: ceac9f78c0b0937cc6c88d3f8efab5819ed4b99ff05f12884010e95d2f2dc959
                                                            • Instruction Fuzzy Hash: 9F5102B0D006088FEB58DFAAD9547EEBBF2AF88310F14C16AC418BB254EB354946CF55
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7013a515d51a1aae4b962728a2906847ebff8afe15204daf3308af863d455d87
                                                            • Instruction ID: 2170dab941f6b310a31bced492e020cc6022e24b578d6e1eb37d1e827093bbeb
                                                            • Opcode Fuzzy Hash: 7013a515d51a1aae4b962728a2906847ebff8afe15204daf3308af863d455d87
                                                            • Instruction Fuzzy Hash: C5519BB1D016188FEB58CF6BD95579AFAF3AFC9314F04C0AAC40CA6255DB740A86CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 95e355e95f530ea875cd10dda9c34fb1b0b75691801e91377658c4794de1a32a
                                                            • Instruction ID: 4cc816086ea3f23e40ac64a5375139a61fd90a65f13cc2b6e65bfe695a7623da
                                                            • Opcode Fuzzy Hash: 95e355e95f530ea875cd10dda9c34fb1b0b75691801e91377658c4794de1a32a
                                                            • Instruction Fuzzy Hash: 18517871E016188BEB58CF6BD9457D9FAF3AFC9314F04C1AAC50CA6264DB740A868F51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3794ec2197af18a9b10b1e9a16d9fd840e7f65170c5ccdb8a2ebcb4fa8e94e63
                                                            • Instruction ID: a594cd90d43b25184526a36fcdeeeb747de21e2b846652ba55affe57f317617a
                                                            • Opcode Fuzzy Hash: 3794ec2197af18a9b10b1e9a16d9fd840e7f65170c5ccdb8a2ebcb4fa8e94e63
                                                            • Instruction Fuzzy Hash: 2C415AB1D016188FEB58CF6BC945799FAF3AFC8310F14C1AAC50CA6255DB744A85CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c7544e34df0123c8cdbca85b60d7f93fc0d256d9546a0ba7d218b10bbd0322b2
                                                            • Instruction ID: df0a71f8222cd5bc549517ef478f7666e78a03405a0523ab98466b4030b049e1
                                                            • Opcode Fuzzy Hash: c7544e34df0123c8cdbca85b60d7f93fc0d256d9546a0ba7d218b10bbd0322b2
                                                            • Instruction Fuzzy Hash: 5B417AB1E016188FEB58CF6BD9457DAFAF3AFC8310F14C1AAD40CA6255DB740A868F51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 992240cd5bc41d155e48ffcc5f50ae722cf113ea6af04c91b33336e8686cefcd
                                                            • Instruction ID: a56fc1cb983987b1cc989bb10b5f32aa387d047c2dc62767e602ee88cfae78d8
                                                            • Opcode Fuzzy Hash: 992240cd5bc41d155e48ffcc5f50ae722cf113ea6af04c91b33336e8686cefcd
                                                            • Instruction Fuzzy Hash: 2B416971E016188BEB58CF6BC945799FAF3AFC8314F14C1AAD40CA6264DB740A858F51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1c8f4a1e62c028ce9228d916d62b0e4aa0e9aff9e6ec6ae4d64be3b42d468b35
                                                            • Instruction ID: f0b0ded6277b5bcd3b44b678c5c5e798b986bbe977fc47cb29f389c4e0a2ea2b
                                                            • Opcode Fuzzy Hash: 1c8f4a1e62c028ce9228d916d62b0e4aa0e9aff9e6ec6ae4d64be3b42d468b35
                                                            • Instruction Fuzzy Hash: 044168B5E016188FEB58CF6BC9457DAFAF3AFC8311F14C1AAC50CA6264DB740A858F51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 1146e58-1146e8d 2 1146e93-1146eb6 0->2 3 11472bc-11472c0 0->3 12 1146f64-1146f68 2->12 13 1146ebc-1146ec9 2->13 4 11472c2-11472d6 3->4 5 11472d9-11472e7 3->5 10 1147358-114736d 5->10 11 11472e9-11472fe 5->11 21 1147374-1147381 10->21 22 114736f-1147372 10->22 23 1147305-1147312 11->23 24 1147300-1147303 11->24 14 1146fb0-1146fb9 12->14 15 1146f6a-1146f78 12->15 29 1146ed8 13->29 30 1146ecb-1146ed6 13->30 18 11473cf 14->18 19 1146fbf-1146fc9 14->19 15->14 37 1146f7a-1146f95 15->37 31 11473d4-1147404 18->31 19->3 27 1146fcf-1146fd8 19->27 25 1147383-11473be 21->25 22->25 26 1147314-1147355 23->26 24->26 78 11473c5-11473cc 25->78 35 1146fe7-1146ff3 27->35 36 1146fda-1146fdf 27->36 32 1146eda-1146edc 29->32 30->32 54 1147406-114741c 31->54 55 114741d-1147424 31->55 32->12 38 1146ee2-1146f44 32->38 35->31 41 1146ff9-1146fff 35->41 36->35 61 1146f97-1146fa1 37->61 62 1146fa3 37->62 89 1146f46 38->89 90 1146f4a-1146f61 38->90 44 1147005-1147015 41->44 45 11472a6-11472aa 41->45 59 1147017-1147027 44->59 60 1147029-114702b 44->60 45->18 49 11472b0-11472b6 45->49 49->3 49->27 63 114702e-1147034 59->63 60->63 64 1146fa5-1146fa7 61->64 62->64 63->45 66 114703a-1147049 63->66 64->14 67 1146fa9 64->67 73 11470f7-1147122 call 1146ca0 * 2 66->73 74 114704f 66->74 67->14 91 114720c-1147226 73->91 92 1147128-114712c 73->92 76 1147052-1147063 74->76 76->31 80 1147069-114707b 76->80 80->31 82 1147081-1147099 80->82 145 114709b call 1147438 82->145 146 114709b call 1147428 82->146 85 11470a1-11470b1 85->45 88 11470b7-11470ba 85->88 93 11470c4-11470c7 88->93 94 11470bc-11470c2 88->94 89->90 90->12 91->3 114 114722c-1147230 91->114 92->45 96 1147132-1147136 92->96 93->18 97 11470cd-11470d0 93->97 94->93 94->97 99 114715e-1147164 96->99 100 1147138-1147145 96->100 101 11470d2-11470d6 97->101 102 11470d8-11470db 97->102 103 1147166-114716a 99->103 104 114719f-11471a5 99->104 117 1147154 100->117 118 1147147-1147152 100->118 101->102 105 11470e1-11470e5 101->105 102->18 102->105 103->104 106 114716c-1147175 103->106 107 11471a7-11471ab 104->107 108 11471b1-11471b7 104->108 105->18 111 11470eb-11470f1 105->111 112 1147184-114719a 106->112 113 1147177-114717c 106->113 107->78 107->108 115 11471c3-11471c5 108->115 116 11471b9-11471bd 108->116 111->73 111->76 112->45 113->112 120 1147232-114723c call 1145b50 114->120 121 114726c-1147270 114->121 122 11471c7-11471d0 115->122 123 11471fa-11471fc 115->123 116->45 116->115 119 1147156-1147158 117->119 118->119 119->45 119->99 120->121 134 114723e-1147253 120->134 121->78 126 1147276-114727a 121->126 129 11471d2-11471d7 122->129 130 11471df-11471f5 122->130 123->45 124 1147202-1147209 123->124 126->78 131 1147280-114728d 126->131 129->130 130->45 137 114729c 131->137 138 114728f-114729a 131->138 134->121 142 1147255-114726a 134->142 139 114729e-11472a0 137->139 138->139 139->45 139->78 142->3 142->121 145->85 146->85
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (oq$(oq$(oq$(oq$(oq$(oq$,q$,q
                                                            • API String ID: 0-2212926057
                                                            • Opcode ID: 321c5ff85f9f74bd946105ffe335202e99e0a30ff1d726291cda21491db97860
                                                            • Instruction ID: 4126c7e8f46ad508fb885ccfcdd0de16728617a236646e632726a8d00fae2c64
                                                            • Opcode Fuzzy Hash: 321c5ff85f9f74bd946105ffe335202e99e0a30ff1d726291cda21491db97860
                                                            • Instruction Fuzzy Hash: 7A129D30A002098FDB29CF69D894EAEBBF2FF49714F158559E945DB2A1D730ED41CB50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 983 11487e9-1148805 984 1148807-114880c 983->984 985 1148811-114881d 983->985 986 1148ba6-1148bab 984->986 988 114882d-1148832 985->988 989 114881f-1148821 985->989 988->986 990 1148829-114882b 989->990 990->988 991 1148837-1148843 990->991 993 1148845-1148851 991->993 994 1148853-1148858 991->994 993->994 996 114885d-1148868 993->996 994->986 998 1148912-114891d 996->998 999 114886e-1148879 996->999 1002 11489c0-11489cc 998->1002 1003 1148923-1148932 998->1003 1004 114888f 999->1004 1005 114887b-114888d 999->1005 1014 11489dc-11489ee 1002->1014 1015 11489ce-11489da 1002->1015 1012 1148934-114893e 1003->1012 1013 1148943-1148952 1003->1013 1006 1148894-1148896 1004->1006 1005->1006 1009 11488b6-11488bb 1006->1009 1010 1148898-11488a7 1006->1010 1009->986 1010->1009 1021 11488a9-11488b4 1010->1021 1012->986 1023 1148954-1148960 1013->1023 1024 1148976-114897f 1013->1024 1029 11489f0-11489fc 1014->1029 1030 1148a12-1148a17 1014->1030 1015->1014 1022 1148a1c-1148a27 1015->1022 1021->1009 1027 11488c0-11488c9 1021->1027 1033 1148a2d-1148a36 1022->1033 1034 1148b09-1148b14 1022->1034 1037 1148962-1148967 1023->1037 1038 114896c-1148971 1023->1038 1035 1148995 1024->1035 1036 1148981-1148993 1024->1036 1043 11488d5-11488e4 1027->1043 1044 11488cb-11488d0 1027->1044 1048 11489fe-1148a03 1029->1048 1049 1148a08-1148a0d 1029->1049 1030->986 1050 1148a4c 1033->1050 1051 1148a38-1148a4a 1033->1051 1052 1148b16-1148b20 1034->1052 1053 1148b3e-1148b4d 1034->1053 1040 114899a-114899c 1035->1040 1036->1040 1037->986 1038->986 1040->1002 1046 114899e-11489aa 1040->1046 1061 11488e6-11488f2 1043->1061 1062 1148908-114890d 1043->1062 1044->986 1063 11489b6-11489bb 1046->1063 1064 11489ac-11489b1 1046->1064 1048->986 1049->986 1054 1148a51-1148a53 1050->1054 1051->1054 1069 1148b37-1148b3c 1052->1069 1070 1148b22-1148b2e 1052->1070 1066 1148ba1 1053->1066 1067 1148b4f-1148b5e 1053->1067 1059 1148a55-1148a61 1054->1059 1060 1148a63 1054->1060 1068 1148a68-1148a6a 1059->1068 1060->1068 1076 11488f4-11488f9 1061->1076 1077 11488fe-1148903 1061->1077 1062->986 1063->986 1064->986 1066->986 1067->1066 1081 1148b60-1148b78 1067->1081 1073 1148a76-1148a89 1068->1073 1074 1148a6c-1148a71 1068->1074 1069->986 1070->1069 1080 1148b30-1148b35 1070->1080 1082 1148ac1-1148acb 1073->1082 1083 1148a8b 1073->1083 1074->986 1076->986 1077->986 1080->986 1095 1148b9a-1148b9f 1081->1095 1096 1148b7a-1148b98 1081->1096 1089 1148acd-1148ad9 call 1148258 1082->1089 1090 1148aea-1148af6 1082->1090 1084 1148a8e-1148a9f call 1148258 1083->1084 1092 1148aa6-1148aab 1084->1092 1093 1148aa1-1148aa4 1084->1093 1104 1148ae0-1148ae5 1089->1104 1105 1148adb-1148ade 1089->1105 1100 1148aff 1090->1100 1101 1148af8-1148afd 1090->1101 1092->986 1093->1092 1098 1148ab0-1148ab3 1093->1098 1095->986 1096->986 1102 1148bac-1148bd4 1098->1102 1103 1148ab9-1148abf 1098->1103 1107 1148b04 1100->1107 1101->1107 1112 1148bd6-1148bdb 1102->1112 1113 1148be0-1148beb 1102->1113 1103->1082 1103->1084 1104->986 1105->1090 1105->1104 1107->986 1114 1148d61-1148d65 1112->1114 1116 1148bf1-1148bfc 1113->1116 1117 1148c93-1148c9c 1113->1117 1120 1148c12 1116->1120 1121 1148bfe-1148c10 1116->1121 1122 1148ce7-1148cf2 1117->1122 1123 1148c9e-1148ca9 1117->1123 1124 1148c17-1148c19 1120->1124 1121->1124 1132 1148cf4-1148d06 1122->1132 1133 1148d08 1122->1133 1130 1148d5f 1123->1130 1131 1148caf-1148cc1 1123->1131 1127 1148c4e-1148c60 1124->1127 1128 1148c1b-1148c2a 1124->1128 1127->1130 1139 1148c66-1148c74 1127->1139 1128->1127 1140 1148c2c-1148c42 1128->1140 1130->1114 1131->1130 1142 1148cc7-1148ccb 1131->1142 1134 1148d0d-1148d0f 1132->1134 1133->1134 1134->1130 1137 1148d11-1148d20 1134->1137 1148 1148d22-1148d2b 1137->1148 1149 1148d48 1137->1149 1152 1148c76-1148c7b 1139->1152 1153 1148c80-1148c83 1139->1153 1140->1127 1158 1148c44-1148c49 1140->1158 1144 1148cd7-1148cda 1142->1144 1145 1148ccd-1148cd2 1142->1145 1150 1148d66-1148d96 call 1148378 1144->1150 1151 1148ce0-1148ce3 1144->1151 1145->1114 1163 1148d41 1148->1163 1164 1148d2d-1148d3f 1148->1164 1156 1148d4d-1148d4f 1149->1156 1172 1148dad-1148db1 1150->1172 1173 1148d98-1148dac 1150->1173 1151->1142 1154 1148ce5 1151->1154 1152->1114 1153->1150 1155 1148c89-1148c8c 1153->1155 1154->1130 1155->1139 1161 1148c8e 1155->1161 1156->1130 1162 1148d51-1148d5d 1156->1162 1158->1114 1161->1130 1162->1114 1167 1148d46 1163->1167 1164->1167 1167->1156
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 4'q$4'q$;q
                                                            • API String ID: 0-144927120
                                                            • Opcode ID: 66a0dca93aab9fe5b8a55fb135b941f01ad7162f77ff6d6b5ef5b60afd7a350b
                                                            • Instruction ID: 10f3679dd395e619e169e4d8b9ce6292b55ac5fd8267fdd3f496a27a5dcdcfed
                                                            • Opcode Fuzzy Hash: 66a0dca93aab9fe5b8a55fb135b941f01ad7162f77ff6d6b5ef5b60afd7a350b
                                                            • Instruction Fuzzy Hash: CBF1A0707142018FEB1D9BBDC958B3D7B96AF85B01F1944AAE502CF3A2EB24CC42C752

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1175 1145c08-1145c15 1176 1145c17-1145c1b 1175->1176 1177 1145c1d-1145c1f 1175->1177 1176->1177 1178 1145c24-1145c2f 1176->1178 1179 1145e30-1145e37 1177->1179 1180 1145c35-1145c3c 1178->1180 1181 1145e38 1178->1181 1182 1145dd1-1145dd7 1180->1182 1183 1145c42-1145c51 1180->1183 1185 1145e3d-1145e75 1181->1185 1186 1145ddd-1145de1 1182->1186 1187 1145dd9-1145ddb 1182->1187 1184 1145c57-1145c66 1183->1184 1183->1185 1193 1145c68-1145c6b 1184->1193 1194 1145c7b-1145c7e 1184->1194 1205 1145e77-1145e7c 1185->1205 1206 1145e7e-1145e82 1185->1206 1188 1145de3-1145de9 1186->1188 1189 1145e2e 1186->1189 1187->1179 1188->1181 1191 1145deb-1145dee 1188->1191 1189->1179 1191->1181 1195 1145df0-1145e05 1191->1195 1196 1145c6d-1145c70 1193->1196 1197 1145c8a-1145c90 1193->1197 1194->1197 1198 1145c80-1145c83 1194->1198 1214 1145e07-1145e0d 1195->1214 1215 1145e29-1145e2c 1195->1215 1200 1145c76 1196->1200 1201 1145d71-1145d77 1196->1201 1207 1145c92-1145c98 1197->1207 1208 1145ca8-1145cc5 1197->1208 1202 1145c85 1198->1202 1203 1145cd6-1145cdc 1198->1203 1211 1145d9c-1145d9e 1200->1211 1209 1145d8f-1145d99 1201->1209 1210 1145d79-1145d7f 1201->1210 1202->1211 1212 1145cf4-1145d06 1203->1212 1213 1145cde-1145ce4 1203->1213 1216 1145e88-1145e8a 1205->1216 1206->1216 1217 1145c9c-1145ca6 1207->1217 1218 1145c9a 1207->1218 1247 1145cce-1145cd1 1208->1247 1209->1211 1219 1145d81 1210->1219 1220 1145d83-1145d8d 1210->1220 1231 1145da7-1145da9 1211->1231 1233 1145d16-1145d39 1212->1233 1234 1145d08-1145d14 1212->1234 1222 1145ce6 1213->1222 1223 1145ce8-1145cf2 1213->1223 1224 1145e1f-1145e22 1214->1224 1225 1145e0f-1145e1d 1214->1225 1215->1179 1226 1145e8c-1145e9e 1216->1226 1227 1145e9f-1145ea6 1216->1227 1217->1208 1218->1208 1219->1209 1220->1209 1222->1212 1223->1212 1224->1181 1228 1145e24-1145e27 1224->1228 1225->1181 1225->1224 1228->1214 1228->1215 1239 1145dbd-1145dbf 1231->1239 1240 1145dab-1145daf 1231->1240 1233->1181 1251 1145d3f-1145d42 1233->1251 1249 1145d61-1145d6f 1234->1249 1242 1145dc3-1145dc6 1239->1242 1240->1239 1243 1145db1-1145db5 1240->1243 1242->1181 1244 1145dc8-1145dcb 1242->1244 1243->1181 1248 1145dbb 1243->1248 1244->1182 1244->1183 1247->1211 1248->1242 1249->1211 1251->1181 1253 1145d48-1145d5a 1251->1253 1253->1249
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,q$,q$b
                                                            • API String ID: 0-2072535545
                                                            • Opcode ID: 381524da97819bcaba8de615cace02e84f5e9c0d017e04e0862406e925cc547e
                                                            • Instruction ID: ae39ae367224f7e878ccbf9cf53001c85e3d15f1044d4a01b4766a6d7b297c77
                                                            • Opcode Fuzzy Hash: 381524da97819bcaba8de615cace02e84f5e9c0d017e04e0862406e925cc547e
                                                            • Instruction Fuzzy Hash: 8B819131A001158FDBACCF6DC488AADBBF7BF89A10B158169D506EB361D731E842CB51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1940 11477f0-1147cde 2015 1147ce4-1147cf4 1940->2015 2016 1148230-1148265 1940->2016 2015->2016 2017 1147cfa-1147d0a 2015->2017 2021 1148267-114826c 2016->2021 2022 1148271-114828f 2016->2022 2017->2016 2018 1147d10-1147d20 2017->2018 2018->2016 2020 1147d26-1147d36 2018->2020 2020->2016 2024 1147d3c-1147d4c 2020->2024 2023 1148356-114835b 2021->2023 2033 1148306-1148312 2022->2033 2034 1148291-114829b 2022->2034 2024->2016 2026 1147d52-1147d62 2024->2026 2026->2016 2027 1147d68-1147d78 2026->2027 2027->2016 2029 1147d7e-1147d8e 2027->2029 2029->2016 2030 1147d94-1147da4 2029->2030 2030->2016 2032 1147daa-1147dba 2030->2032 2032->2016 2035 1147dc0-114822f 2032->2035 2040 1148314-1148320 2033->2040 2041 1148329-1148335 2033->2041 2034->2033 2039 114829d-11482a9 2034->2039 2050 11482ce-11482d1 2039->2050 2051 11482ab-11482b6 2039->2051 2040->2041 2047 1148322-1148327 2040->2047 2048 1148337-1148343 2041->2048 2049 114834c-114834e 2041->2049 2047->2023 2048->2049 2060 1148345-114834a 2048->2060 2049->2023 2131 1148350 call 11487e9 2049->2131 2052 11482d3-11482df 2050->2052 2053 11482e8-11482f4 2050->2053 2051->2050 2062 11482b8-11482c2 2051->2062 2052->2053 2064 11482e1-11482e6 2052->2064 2056 11482f6-11482fd 2053->2056 2057 114835c-1148380 2053->2057 2056->2057 2061 11482ff-1148304 2056->2061 2070 1148387-114838c 2057->2070 2071 114838e 2057->2071 2060->2023 2061->2023 2062->2050 2068 11482c4-11482c9 2062->2068 2064->2023 2068->2023 2073 1148390-1148391 2070->2073 2071->2073 2131->2023
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $q$$q
                                                            • API String ID: 0-3126353813
                                                            • Opcode ID: a0d22adbaf8c69244d65c8f56bed3c3cf080fcf9a9bae9645d8492bfbc652e3c
                                                            • Instruction ID: d2e7b6be0890f0355bea76b9ef7d6953434685a2ec3dfc999f68e88e20c805c0
                                                            • Opcode Fuzzy Hash: a0d22adbaf8c69244d65c8f56bed3c3cf080fcf9a9bae9645d8492bfbc652e3c
                                                            • Instruction Fuzzy Hash: ED520234A003198FEB289BA4C964B9EBBB2EB94700F1080ADC14A6F395DF355D45DFA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2477 11456a8-11456ca 2478 11456e0-11456eb 2477->2478 2479 11456cc-11456d0 2477->2479 2480 11456f1-11456f3 2478->2480 2481 1145793-11457bf 2478->2481 2482 11456d2-11456de 2479->2482 2483 11456f8-11456ff 2479->2483 2484 114578b-1145790 2480->2484 2490 11457c6-114581e 2481->2490 2482->2478 2482->2483 2485 1145701-1145708 2483->2485 2486 114571f-1145728 2483->2486 2485->2486 2488 114570a-1145715 2485->2488 2586 114572a call 1145698 2486->2586 2587 114572a call 11456a8 2486->2587 2488->2490 2491 114571b-114571d 2488->2491 2489 1145730-1145732 2492 1145734-1145738 2489->2492 2493 114573a-1145742 2489->2493 2509 1145820-1145826 2490->2509 2510 114582d-114583f 2490->2510 2491->2484 2492->2493 2495 1145755-1145774 call 1146108 2492->2495 2496 1145744-1145749 2493->2496 2497 1145751-1145753 2493->2497 2503 1145776-114577f 2495->2503 2504 1145789 2495->2504 2496->2497 2497->2484 2581 1145781 call 114a650 2503->2581 2582 1145781 call 114a70d 2503->2582 2504->2484 2506 1145787 2506->2484 2509->2510 2512 1145845-1145849 2510->2512 2513 11458d3-11458d5 2510->2513 2514 1145859-1145866 2512->2514 2515 114584b-1145857 2512->2515 2579 11458d7 call 1145a70 2513->2579 2580 11458d7 call 1145a60 2513->2580 2523 1145868-1145872 2514->2523 2515->2523 2516 11458dd-11458e3 2517 11458e5-11458eb 2516->2517 2518 11458ef-11458f6 2516->2518 2521 1145951-114599f 2517->2521 2522 11458ed 2517->2522 2583 11459a1 call 67c25e8 2521->2583 2584 11459a1 call 67c23e0 2521->2584 2585 11459a1 call 67c23d1 2521->2585 2522->2518 2526 1145874-1145883 2523->2526 2527 114589f-11458a3 2523->2527 2536 1145885-114588c 2526->2536 2537 1145893-114589d 2526->2537 2528 11458a5-11458ab 2527->2528 2529 11458af-11458b3 2527->2529 2532 11458ad 2528->2532 2533 11458f9-114594a 2528->2533 2529->2518 2534 11458b5-11458b9 2529->2534 2532->2518 2533->2521 2538 11459b7-11459db 2534->2538 2539 11458bf-11458d1 2534->2539 2536->2537 2537->2527 2550 11459e1-11459e3 2538->2550 2551 11459dd-11459df 2538->2551 2539->2518 2553 11459f4-11459f6 2550->2553 2554 11459e5-11459e9 2550->2554 2552 1145a59-1145a5c 2551->2552 2559 11459f8-11459fc 2553->2559 2560 1145a09-1145a0f 2553->2560 2557 11459ef-11459f2 2554->2557 2558 11459eb-11459ed 2554->2558 2557->2552 2558->2552 2561 1145a02-1145a07 2559->2561 2562 11459fe-1145a00 2559->2562 2564 1145a11-1145a38 2560->2564 2565 1145a3a-1145a3c 2560->2565 2561->2552 2562->2552 2563 11459a7-11459b0 2563->2538 2567 1145a43-1145a45 2564->2567 2565->2567 2571 1145a47-1145a49 2567->2571 2572 1145a4b-1145a4d 2567->2572 2571->2552 2573 1145a56 2572->2573 2574 1145a4f-1145a54 2572->2574 2573->2552 2574->2552 2579->2516 2580->2516 2581->2506 2582->2506 2583->2563 2584->2563 2585->2563 2586->2489 2587->2489
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Hq$Hq
                                                            • API String ID: 0-925789375
                                                            • Opcode ID: 2e12923c39dbb45bf74dc087fd2282783920f5e403d181737c1c14ca6a747d41
                                                            • Instruction ID: dbb171f175616ef0b4583523dabaf786b25fffa175b2d23d32e900d83b4f234c
                                                            • Opcode Fuzzy Hash: 2e12923c39dbb45bf74dc087fd2282783920f5e403d181737c1c14ca6a747d41
                                                            • Instruction Fuzzy Hash: 1DB1BB31B043058FEB6A9F69D898B7A7BA3BF89614F158929E446CB291DF34CC01C791

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2696 67c23e0-67c23f3 2698 67c23fc-67c2410 2696->2698 2699 67c23f5-67c23f7 2696->2699 2702 67c2416 2698->2702 2703 67c2412-67c2414 2698->2703 2700 67c2480-67c2483 2699->2700 2704 67c2419-67c241e 2702->2704 2703->2704 2705 67c2425-67c243f 2704->2705 2708 67c2484-67c2492 2705->2708 2709 67c2441-67c2477 2705->2709 2712 67c249a 2708->2712 2713 67c2494-67c2498 2708->2713 2709->2705 2725 67c2479 2709->2725 2714 67c249b-67c249d 2712->2714 2715 67c24a2-67c24b7 2712->2715 2713->2712 2714->2715 2719 67c24b9-67c24bb 2715->2719 2720 67c24c0-67c24e7 2715->2720 2722 67c25c4-67c25cb 2719->2722 2728 67c251e-67c2520 2720->2728 2729 67c24e9-67c24ff 2720->2729 2725->2700 2730 67c2529-67c253d 2728->2730 2731 67c2522-67c2524 2728->2731 2729->2728 2737 67c2501-67c2518 2729->2737 2735 67c253f-67c2541 2730->2735 2736 67c2543 2730->2736 2731->2722 2738 67c2546-67c2563 2735->2738 2736->2738 2737->2728 2743 67c25cc 2737->2743 2738->2743 2744 67c2565-67c2568 2738->2744 2748 67c25d1-67c25de 2743->2748 2744->2743 2745 67c256a-67c256e 2744->2745 2746 67c25b0-67c25bd 2745->2746 2747 67c2570-67c2576 2745->2747 2746->2722 2749 67c2579-67c2581 2747->2749 2754 67c25e6 2748->2754 2755 67c25e0 2748->2755 2749->2748 2751 67c2583-67c2599 call 67c2190 2749->2751 2765 67c259b-67c259d 2751->2765 2766 67c25a7-67c25aa 2751->2766 2759 67c25ea-67c2604 2754->2759 2757 67c2640 2755->2757 2758 67c25e2 2755->2758 2760 67c2648-67c265a 2757->2760 2758->2759 2761 67c25e4 2758->2761 2762 67c260d-67c262c 2759->2762 2774 67c2607 call 67c2670 2759->2774 2769 67c265c-67c265f 2760->2769 2770 67c2661 2760->2770 2761->2754 2762->2760 2765->2766 2766->2743 2767 67c25ac-67c25ae 2766->2767 2767->2746 2767->2749 2771 67c2664-67c2669 2769->2771 2770->2771 2774->2762
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LRq$LRq
                                                            • API String ID: 0-3710822783
                                                            • Opcode ID: 740a4ad424c83a05e964bfbbe74f1f70f36c517de22ee462c08bc3766a04d89b
                                                            • Instruction ID: 8433ae22efa8de6f5b81c09818b349cfac92dec3d979684b4deab5406bb18abf
                                                            • Opcode Fuzzy Hash: 740a4ad424c83a05e964bfbbe74f1f70f36c517de22ee462c08bc3766a04d89b
                                                            • Instruction Fuzzy Hash: E3819334B002058FDB44EB79D854A6E7BB6AF8972071585ADE511DB3B6EB30DE01CBA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2775 67c9510-67c952f 2776 67c96ea-67c970f 2775->2776 2777 67c9535-67c953e 2775->2777 2782 67c9716-67c975e 2776->2782 2781 67c9544-67c9599 2777->2781 2777->2782 2790 67c959b-67c95c0 2781->2790 2791 67c95c3-67c95cc 2781->2791 2801 67c9766-67c97b0 call 67c9350 2782->2801 2802 67c9760-67c9765 2782->2802 2790->2791 2792 67c95ce 2791->2792 2793 67c95d1-67c95e1 2791->2793 2792->2793 2833 67c95e3 call 67c96f0 2793->2833 2834 67c95e3 call 67c9510 2793->2834 2835 67c95e3 call 67c9500 2793->2835 2796 67c95e9-67c95eb 2799 67c95ed-67c95f2 2796->2799 2800 67c9645-67c9692 2796->2800 2803 67c962b-67c963e 2799->2803 2804 67c95f4-67c9629 2799->2804 2815 67c9699-67c969e 2800->2815 2825 67c97b5-67c97ba 2801->2825 2802->2801 2803->2800 2804->2815 2816 67c96a8-67c96ad 2815->2816 2817 67c96a0 2815->2817 2819 67c96af 2816->2819 2820 67c96b7-67c96bc 2816->2820 2817->2816 2819->2820 2823 67c96be-67c96cc call 67c91c4 call 67c91dc 2820->2823 2824 67c96d1 2820->2824 2823->2824 2824->2776 2833->2796 2834->2796 2835->2796
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (&q$(q
                                                            • API String ID: 0-2464455664
                                                            • Opcode ID: 8d53c126a1596a1b64033ad558432bf131f3cc53035c908ca2bf3b0f7dc20545
                                                            • Instruction ID: dff11b8edc48560652ee0f8da67c70033ecaebd35df05ee8b2855f04f9f92c4b
                                                            • Opcode Fuzzy Hash: 8d53c126a1596a1b64033ad558432bf131f3cc53035c908ca2bf3b0f7dc20545
                                                            • Instruction Fuzzy Hash: 60717D31F002199FDB55DFA9D8546AEBBB2AFC8710F14852DE506BB280EE309D46C7D1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xq$Xq
                                                            • API String ID: 0-1556399337
                                                            • Opcode ID: 7912d432a2ef4bfdc3eb9ce6cfab0a276fb8fa34af6e483723502d9032f78fdf
                                                            • Instruction ID: f9dc6f9e168067cd6a9abfd1568d07bb28a98ed73e8917b392c99ff815716fb4
                                                            • Opcode Fuzzy Hash: 7912d432a2ef4bfdc3eb9ce6cfab0a276fb8fa34af6e483723502d9032f78fdf
                                                            • Instruction Fuzzy Hash: 9D310975B103358BEF2D5A6955943BE65EABBC4A10F1C443DD92ACB380DFB4CC0586A2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LRq
                                                            • API String ID: 0-3187445251
                                                            • Opcode ID: 7b3c085547e048b4b5168d1e3ef13013b696fad0b3deb0f7950b633c52585698
                                                            • Instruction ID: ca484250b29906c06d836792d2821667eb1d213d5a5db4c6dd915c82218614f3
                                                            • Opcode Fuzzy Hash: 7b3c085547e048b4b5168d1e3ef13013b696fad0b3deb0f7950b633c52585698
                                                            • Instruction Fuzzy Hash: 2422C778D00219CFCB54EF68E995A9DBBF1BF48305F1086A9D809AB758DB306E45CF90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LRq
                                                            • API String ID: 0-3187445251
                                                            • Opcode ID: 7fa8dcc8fd21994c860184711a80f4af0eceaf32bf385216d8f04fd49d00a515
                                                            • Instruction ID: 12fe8562f482f62b7c94b2a643fae209bccb89f90fdf04a15751a1e1d09e9336
                                                            • Opcode Fuzzy Hash: 7fa8dcc8fd21994c860184711a80f4af0eceaf32bf385216d8f04fd49d00a515
                                                            • Instruction Fuzzy Hash: 0922B778D00219CFCB54EF68E995A9DBBF1BF48305F1086A9D809AB758DB306E45CF90
                                                            APIs
                                                            • LdrInitializeThunk.NTDLL(00000000), ref: 067982B6
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID: InitializeThunk
                                                            • String ID:
                                                            • API String ID: 2994545307-0
                                                            • Opcode ID: 69aff623910099078539ecef91962e5606c50414ca5e5353ecdc8c222245bc0d
                                                            • Instruction ID: cfe44977dbc8d42bd52c62274b23bcffb8efe4ab1bab956ebf0084607c3307bc
                                                            • Opcode Fuzzy Hash: 69aff623910099078539ecef91962e5606c50414ca5e5353ecdc8c222245bc0d
                                                            • Instruction Fuzzy Hash: 97117C74E012098FEF44DBA8E588AADB7F5FF8A314F148565E944AB242D730A841CB61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: (oq
                                                            • API String ID: 0-1999159160
                                                            • Opcode ID: 3a2d3f19c2c1481683479a097ab0db3a710ce46193722be2a2ea8eeb33f6c3c7
                                                            • Instruction ID: 307867ac4124cbef33ad7212b4dc2a5ed2b56b7712a60b15bbe954d58be75db8
                                                            • Opcode Fuzzy Hash: 3a2d3f19c2c1481683479a097ab0db3a710ce46193722be2a2ea8eeb33f6c3c7
                                                            • Instruction Fuzzy Hash: 2941EF35B442048FDB199B78E9546AE7BF6BFC8211F198429D506AB390CE319C02CB91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: b
                                                            • API String ID: 0-2387849686
                                                            • Opcode ID: eacc50b3b7c10bbcafae464f9e6f7a35f7801bdc4a889b29a48640588dcd94e1
                                                            • Instruction ID: 53edb6ceb8333d07dd545ce87d2004814a29f94d317a16f3229575682c1d77c7
                                                            • Opcode Fuzzy Hash: eacc50b3b7c10bbcafae464f9e6f7a35f7801bdc4a889b29a48640588dcd94e1
                                                            • Instruction Fuzzy Hash: 0F31807160821AAFCB1A9FA9D454AAF7FB2FF88600F104424F9559B650CB38DC61CBE1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: b
                                                            • API String ID: 0-2387849686
                                                            • Opcode ID: 7915df2fbba6444854668d07f656135a97fed49ffa64bb21c05547377807c4df
                                                            • Instruction ID: f39363dd4be51ec7475e1991b97ae967b32872f1db9a05e9e6d8cbf54a7745c7
                                                            • Opcode Fuzzy Hash: 7915df2fbba6444854668d07f656135a97fed49ffa64bb21c05547377807c4df
                                                            • Instruction Fuzzy Hash: 2721F4343047004BEB2E973E9898A7D7B9B9FC9A1675844A9D506CB7D6EF24CC4393C1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: b
                                                            • API String ID: 0-2387849686
                                                            • Opcode ID: 1fbe5322a771dd166e2a20bc58db1f17e4acc18645ced91547e1250069c816c0
                                                            • Instruction ID: 3a2d5243edf2e53f7099f2a7ded1e30adda020eb1c3217ea90707bb754c894ea
                                                            • Opcode Fuzzy Hash: 1fbe5322a771dd166e2a20bc58db1f17e4acc18645ced91547e1250069c816c0
                                                            • Instruction Fuzzy Hash: 0A21BD393047004BEB2D972A8858B7A769BAFC4B1AF548078D506CBBD9EF25CC4292D1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: b
                                                            • API String ID: 0-2387849686
                                                            • Opcode ID: 36f092749db6fe99a526be9e96a11bd8cb6ed7f71251507de9c9b33e98825996
                                                            • Instruction ID: 2cc4c0dc8bbe401b74e6df2b9645a152470bbec00a9182659bec9c25de3ae8f5
                                                            • Opcode Fuzzy Hash: 36f092749db6fe99a526be9e96a11bd8cb6ed7f71251507de9c9b33e98825996
                                                            • Instruction Fuzzy Hash: 2721D0357047118FD71A9A69C4A863EBBB3EF89A60B1584A9E906CF355CF30DC02CBC0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: b
                                                            • API String ID: 0-2387849686
                                                            • Opcode ID: 83ed9e0c548facb8f221d50aae870c90770c1614d5aeda4bfed754b939f0ebc7
                                                            • Instruction ID: 92fcfea56b9c21f5fb1604d9bfe7d9a1dc9a1efcb936b4fd46b5822f8d0edb92
                                                            • Opcode Fuzzy Hash: 83ed9e0c548facb8f221d50aae870c90770c1614d5aeda4bfed754b939f0ebc7
                                                            • Instruction Fuzzy Hash: 88210471A082558FCB2A9F68E4657AB3FF2EF85614F104469F8458F651CB38CC16CBE0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: b
                                                            • API String ID: 0-2387849686
                                                            • Opcode ID: 58aa166978660050d658d7b855c1ce4cfb29aeff0aae76b4b38704ba7cfe9a9c
                                                            • Instruction ID: 227276d76f1e8397bcac5dd709376096b1428481af35c0bef8d6529290ad6847
                                                            • Opcode Fuzzy Hash: 58aa166978660050d658d7b855c1ce4cfb29aeff0aae76b4b38704ba7cfe9a9c
                                                            • Instruction Fuzzy Hash: 491182317447119FD7595A2DC49893EBBA7BF89A617154568E906CB350DF20DC02CBD0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eb0bd8e2196cc6e331ee30c84b4bd8631766190cd9e7e4ef97094425a9d93467
                                                            • Instruction ID: 11f85c27ebc6b9f958c6e5ef89ed208c62f60cde4ad60dd6ed3d64ec6cdfb426
                                                            • Opcode Fuzzy Hash: eb0bd8e2196cc6e331ee30c84b4bd8631766190cd9e7e4ef97094425a9d93467
                                                            • Instruction Fuzzy Hash: 99F14B75A802158FCB09CF6CD594AADBBF6FF88714B1A8459E506EB361CB31EC41CB50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e6621826766ab7e24e5a9be7e822b3a3acf0925e0eab4879cc73dde71b1041a1
                                                            • Instruction ID: 914723e17075d5d98e0d86a4662ff14a495abad92fc14427153ed441e91b1604
                                                            • Opcode Fuzzy Hash: e6621826766ab7e24e5a9be7e822b3a3acf0925e0eab4879cc73dde71b1041a1
                                                            • Instruction Fuzzy Hash: CC711A347002458FEB19DF2CC898ABD7BE6AF49A04F1940A9E906CB3B1DB70DC51CB91
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: caf45909aa9f5bb3b65e424475dae7a0ff48e9510ed5efb0b47b14f3cf8d47eb
                                                            • Instruction ID: d6fa33ddfedf703c66ffb86aa6bb402f185c16aa5252415c1cf9313f745eff78
                                                            • Opcode Fuzzy Hash: caf45909aa9f5bb3b65e424475dae7a0ff48e9510ed5efb0b47b14f3cf8d47eb
                                                            • Instruction Fuzzy Hash: 1151CF308A93039FC3142F24A5AD17EBBA4FF4F32BB456C08A48E918599F755469CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2f046b9ce310799b9fa513569b612603683abf77b8e35bfba5d730cb6c175bc4
                                                            • Instruction ID: dab24e47f413e331d86fdce7193c45caf6f512ceef7bea89f1ceda63e4b317a8
                                                            • Opcode Fuzzy Hash: 2f046b9ce310799b9fa513569b612603683abf77b8e35bfba5d730cb6c175bc4
                                                            • Instruction Fuzzy Hash: B651C0308A93039FC3542F24E6AD17EBBA4FF4F32BB456C08B44E918589F755465CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b0c42fc1cea80024c1e106aaf94cea363290fd897a31d6008250857ae8cdb0ba
                                                            • Instruction ID: 825bb4e29b73e2bf8385bcd708221d4bb63feeed1b57e4a6431c835aff6ec107
                                                            • Opcode Fuzzy Hash: b0c42fc1cea80024c1e106aaf94cea363290fd897a31d6008250857ae8cdb0ba
                                                            • Instruction Fuzzy Hash: 2461CF74E01318CFDB15DFA5D9987AEBBB2FF88300F208529D805AB259DB399945CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ccc779908df1457944bb27c36a694d7c696e33d8c575555329a30d7312166292
                                                            • Instruction ID: 0b920a90208ef971fef02297c354b573e1e081cf1da655b97697636fb6aa36e7
                                                            • Opcode Fuzzy Hash: ccc779908df1457944bb27c36a694d7c696e33d8c575555329a30d7312166292
                                                            • Instruction Fuzzy Hash: C2518374E01208DFDB58DFAAD5849DDBBF2BF89300F248169E819AB365DB30A941CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51c0df917765088b14743713ed69b3d849c6b4506b897588f7ff4b2c4c50c36e
                                                            • Instruction ID: 7660881c8efc8ab7378b28282090602214c5ca5c1b7b18b36352de81c279f8af
                                                            • Opcode Fuzzy Hash: 51c0df917765088b14743713ed69b3d849c6b4506b897588f7ff4b2c4c50c36e
                                                            • Instruction Fuzzy Hash: D9417834905319CFDB18AFB5D45D7EEBBB1FB4A326F108869D201A7698CB790A44CF90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 47f70d5094a8391cb5df03dc67d36e5451dc4abf3401f2bcd3c3a238de1dc9cf
                                                            • Instruction ID: 64e6a96392113c8888c211b6451194178159aa85b6432a599c27dee1e60ba668
                                                            • Opcode Fuzzy Hash: 47f70d5094a8391cb5df03dc67d36e5451dc4abf3401f2bcd3c3a238de1dc9cf
                                                            • Instruction Fuzzy Hash: 33519374E01308CFDB18EFA9D59499DBBF2FF89314B208469E815AB364DB35A945CF40
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67fdc4e14d363362d59c365936c14671cb82c00b1252ddcaffd7611fa7683303
                                                            • Instruction ID: 8a84311e545d1b4fe82130aa399db2f0ade7880614ae488f6dd6cfc78bc3091b
                                                            • Opcode Fuzzy Hash: 67fdc4e14d363362d59c365936c14671cb82c00b1252ddcaffd7611fa7683303
                                                            • Instruction Fuzzy Hash: AC51F279E00208CFDB54DFA9D5847EDBBF2EF89310F20902AD815A7298DB349A46CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f39d297d16fd7a5764ebdfff8a647e4c53753316198150847a69c8c22dbf22ee
                                                            • Instruction ID: d91737815d8d0c7dfe9eac50001b55c2bdc7326633f7eeb90485e12aa06de9ba
                                                            • Opcode Fuzzy Hash: f39d297d16fd7a5764ebdfff8a647e4c53753316198150847a69c8c22dbf22ee
                                                            • Instruction Fuzzy Hash: CB41C331A0424DDFCF1ACFA8C844A9EBFB2AF8D318F148556E915AB2A5D330D914CB91
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7b3e4fbb8482ae533fbd5d20bb30aaeaf17686e0e5a69e270dd898ffd585f0ad
                                                            • Instruction ID: 341c78e2b2339f5ccba3b0d64cf7508f5eef07b1753ac84ffbd42592c37c9d13
                                                            • Opcode Fuzzy Hash: 7b3e4fbb8482ae533fbd5d20bb30aaeaf17686e0e5a69e270dd898ffd585f0ad
                                                            • Instruction Fuzzy Hash: F8414131E007199BDB54CFA9C890AEEFBF5AF88710F14812DE515B7284EB70A945CB90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7e065fe3fc14efc539bbb9522c0e3ecc035b947ea474c6a892361e296c4d09cb
                                                            • Instruction ID: 3ae2a1c2ba4798ec767f2c18bc21012580d8aba693f5373945473e732959fa6d
                                                            • Opcode Fuzzy Hash: 7e065fe3fc14efc539bbb9522c0e3ecc035b947ea474c6a892361e296c4d09cb
                                                            • Instruction Fuzzy Hash: 53413274D04609CFEF08DFA8E4946ADBBF2BF5A709F218129D41AAB244D7349842CF65
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dbf93c1c445467e208b5fb532ea8dc7038f5071c7dbbb2491cdd1709ff75a6aa
                                                            • Instruction ID: f8ce5dc80278dbf85f19dee627ddd78b9c218794619750957ec255a0a2abda50
                                                            • Opcode Fuzzy Hash: dbf93c1c445467e208b5fb532ea8dc7038f5071c7dbbb2491cdd1709ff75a6aa
                                                            • Instruction Fuzzy Hash: D241C078E00208DFDB44DFA9D5947EDBBF2BF89310F10902AD815A7298EB349A46CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4a5270f1071509ca20e402327f315117f5e36bd7649fad647ab386caaacef668
                                                            • Instruction ID: b09fff1dae10a3376898096da297e24b17d6f5b48e4d52ae9adac7d0a756f5fa
                                                            • Opcode Fuzzy Hash: 4a5270f1071509ca20e402327f315117f5e36bd7649fad647ab386caaacef668
                                                            • Instruction Fuzzy Hash: CB410F74D04609CFEF08DFA8E4846ADBBF2BF5A709F219129E419AB284D7349841CF54
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 366d2bd8e135ff0d894bb22e48685107095163c2cf55cb4717a9b60a046abb7c
                                                            • Instruction ID: d488ec35776f2db60417f7a74ea96d9256291b5f8d874800cff2180fbb9dd3bb
                                                            • Opcode Fuzzy Hash: 366d2bd8e135ff0d894bb22e48685107095163c2cf55cb4717a9b60a046abb7c
                                                            • Instruction Fuzzy Hash: 88411370E002098BDF08DFA9E548AEEBBF2BF99305F14D129D418AB254DB759841CF64
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d71051092c4b48efdc09c4385be9aed8fbe73f28259f66e1239e04609bf0433f
                                                            • Instruction ID: de24ae8f636c095c04cfa9f85fc4f0e5e73ebff682c09f5c804fa25abbf2f499
                                                            • Opcode Fuzzy Hash: d71051092c4b48efdc09c4385be9aed8fbe73f28259f66e1239e04609bf0433f
                                                            • Instruction Fuzzy Hash: 93318B34805309DFDB14AFB5D4683FEBBB1EF4A325F148869D101A7698CB790A48CF90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ef67360abd041fa934dcaa3c1c091fef1565baee8b1ab5c7ca4a9101f15a373
                                                            • Instruction ID: 3314695c62b59491d568c951c5e3cd157612dceee9bdcb04a2079b352c1c0d84
                                                            • Opcode Fuzzy Hash: 3ef67360abd041fa934dcaa3c1c091fef1565baee8b1ab5c7ca4a9101f15a373
                                                            • Instruction Fuzzy Hash: 4631D6315016459FD318CB2CC888962BBB9AF85B3CB18875DC9794B6D6D731E813C7D0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9614153360435a98c259ef472ca3f013f8f23689ef55b6a9c305f79cd6a9d510
                                                            • Instruction ID: f6b1cda7729ee635b7d180c6b87c056d47e202273a1bf7772da72b3ec4ad6dbf
                                                            • Opcode Fuzzy Hash: 9614153360435a98c259ef472ca3f013f8f23689ef55b6a9c305f79cd6a9d510
                                                            • Instruction Fuzzy Hash: 2F31B574E406058FCB08CF6DD8849AEBFF6FF85710B1A8559E5569B3A1DB30AC12CB90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a4334cb8d9a59a553101b1a3ca67e8d55625e3e111e550299f6d764a52fb2be4
                                                            • Instruction ID: dc9139f05ee80daf6895258735b328e90c093db97a9009a31127af8c032b229e
                                                            • Opcode Fuzzy Hash: a4334cb8d9a59a553101b1a3ca67e8d55625e3e111e550299f6d764a52fb2be4
                                                            • Instruction Fuzzy Hash: DE219535A003149FCB18DF2CD840AAE7BB6EF99760B50C519E9159B344DB31EE85CBD1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ace1f8ad08f45f4333a1cc15a390942f805b38b35f38b3feac96e2b5d7544793
                                                            • Instruction ID: 2f205a884214d3e1ff7fb98eba891530d3356d1dab42f2788597e4fe2f04f6c5
                                                            • Opcode Fuzzy Hash: ace1f8ad08f45f4333a1cc15a390942f805b38b35f38b3feac96e2b5d7544793
                                                            • Instruction Fuzzy Hash: 9A2159B4C086199FDB26EFA8C4541EEBFF4FF49310F40456AD441B7254EB316689CBA2
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3690687799.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_10ed000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e0ebf0e97dbf9707163fe7aa3caaa0d0b7d941fceaaa9210044bd4e7a8a9a4a7
                                                            • Instruction ID: f0276e04f8defb897968f0aca219defefc088dabf476cca00e79ddaa08812eec
                                                            • Opcode Fuzzy Hash: e0ebf0e97dbf9707163fe7aa3caaa0d0b7d941fceaaa9210044bd4e7a8a9a4a7
                                                            • Instruction Fuzzy Hash: EE2145B1500200EFDF15DF94D9C8B5ABBE5FB94314F20C1A9E9490F246C736E446CBA2
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7f781222a084fd327a40c6f085f9ec96b96c1d1c7dc6f35847bf7213936d99bb
                                                            • Instruction ID: 92c70ee35a38e36276b966b170d8a6090572b103eff7db2cfdeae107947e5f89
                                                            • Opcode Fuzzy Hash: 7f781222a084fd327a40c6f085f9ec96b96c1d1c7dc6f35847bf7213936d99bb
                                                            • Instruction Fuzzy Hash: 3821D3714019055BC22CCB2CC888962BBBABF89F3CB54871CC9794B6D5D732E812CBD0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3690766786.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_10fd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 448870542df616d478443c8b397d481ee43b53b5b2313e13f9b0a7cc3db89065
                                                            • Instruction ID: c338b513434c6c7f39827661ef59dc21000dcf2fda03d0880e79b5b9d8c7291d
                                                            • Opcode Fuzzy Hash: 448870542df616d478443c8b397d481ee43b53b5b2313e13f9b0a7cc3db89065
                                                            • Instruction Fuzzy Hash: D7212271504204AFDB25CFA4D9C1B26BBA5FB84314F20C9ADEA894F642C736D447CB62
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 742c303a05ae0c5eb3897cc556baa8c8ecc05b5824f33cd7f7cbbd65a00f29e6
                                                            • Instruction ID: f7bb56c714209bec7a7f0860bb64e9f2d8ae127fcc9365b85c9c19bbfe8c185f
                                                            • Opcode Fuzzy Hash: 742c303a05ae0c5eb3897cc556baa8c8ecc05b5824f33cd7f7cbbd65a00f29e6
                                                            • Instruction Fuzzy Hash: 60115B317043541FDB466EB898243AE3EA3EFC9350B14442EE50ADB381DE348D05C3E2
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a93a5348fde7755b7a4753cfe5adf39e0f761b2938702e25db2a88d9a84f16de
                                                            • Instruction ID: ddede3e2fcda1e3c57c9b59533ae4eb61a8f31b9185fea3939fbfb90ad67bfd7
                                                            • Opcode Fuzzy Hash: a93a5348fde7755b7a4753cfe5adf39e0f761b2938702e25db2a88d9a84f16de
                                                            • Instruction Fuzzy Hash: C9113631E043599FCB01DBBCAC005EEFBB1FF89210B248796E625B7151EB311946C791
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1864eb86342b6bb498a4d5ceb2137d57beba14ccc312ce75c88d0c30066d145e
                                                            • Instruction ID: ca0f6fb4f07a891489a77615de8601f5f5e9328c96cb59e0cc910e206dec378f
                                                            • Opcode Fuzzy Hash: 1864eb86342b6bb498a4d5ceb2137d57beba14ccc312ce75c88d0c30066d145e
                                                            • Instruction Fuzzy Hash: B2117C74E042498BEF08CFAAE4452EEBBF2AFC9311F08C165C818A7256D73055168F54
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e0cc9d032ed21accc5b0dba43f7a3eb41976022e1c17fc65a4007409b3df19b
                                                            • Instruction ID: c8029619b24cd6a423dba495a95e48022e1504bd259f272015b7d9e44b140874
                                                            • Opcode Fuzzy Hash: 8e0cc9d032ed21accc5b0dba43f7a3eb41976022e1c17fc65a4007409b3df19b
                                                            • Instruction Fuzzy Hash: 5211C8357082548FE7050BB95C586BBBAABBFCA320B18887FE146C7295CD248C1683B1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 76bfbd2a386bb809abbd6483154f492277fa7c5fbc68e8da12365b41406f949a
                                                            • Instruction ID: f8a1860817b421db6840bde9a624fbe7085f43445054329f2e352ef7d5673a53
                                                            • Opcode Fuzzy Hash: 76bfbd2a386bb809abbd6483154f492277fa7c5fbc68e8da12365b41406f949a
                                                            • Instruction Fuzzy Hash: 9F21A17490434A9FDB55DFB8D64469EBFF2FF45304F0482A9C0989F269DB341906CB81
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8ee43fce839404b6af5d0058cddfb7ac8de2e05a5963d9a60326833709e3fc65
                                                            • Instruction ID: 85467045fc57f4e25db5b15168bf2f8e303e9e0068f11b092ecce5ed8991563a
                                                            • Opcode Fuzzy Hash: 8ee43fce839404b6af5d0058cddfb7ac8de2e05a5963d9a60326833709e3fc65
                                                            • Instruction Fuzzy Hash: F2112976800249DFDB50CF99C845BEEBFF4EB88324F14841DE654A7250C339A554DFA5
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3690687799.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_10ed000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                            • Instruction ID: 3e42c7f863adadb964409f3120e85ccdc3efd5a7de7e0ad3dab3d36a9c3bb1cb
                                                            • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                            • Instruction Fuzzy Hash: 2D11DFB2404280CFCB12CF54D5C8B56BFB2FB94324F24C5A9D9490B657C33AE456CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55ff01563fb8a1e78b6b13d2417a4514c2ff1cd40da80dcebc6601d78aaecd5a
                                                            • Instruction ID: f83695414a622a5aff391a3cc2c51514df2174608153185f7cab76a6bc064b25
                                                            • Opcode Fuzzy Hash: 55ff01563fb8a1e78b6b13d2417a4514c2ff1cd40da80dcebc6601d78aaecd5a
                                                            • Instruction Fuzzy Hash: 281126B6800249DFDB50DF99C944BEEBBF4EB48320F148419EA14A7250C339A954DFA9
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 65c0d9eeb02d6d9917335d8c8952149c0e648d67513e5a0e8fd5a32da205b134
                                                            • Instruction ID: 4890262e8935463a2d8bde7468764b8b3debacf1ad37164e9269c81556c58aa9
                                                            • Opcode Fuzzy Hash: 65c0d9eeb02d6d9917335d8c8952149c0e648d67513e5a0e8fd5a32da205b134
                                                            • Instruction Fuzzy Hash: 28110074F401498FEB00DFE8D954BAEBFF6AB49321F508069D908AB345E63099428F51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9ea2616c179007ede4a60816b908fd5170429b6ca40dbde39455a4998286e8b
                                                            • Instruction ID: d824e92f63365091fa09356c2ca1637b1226a55e59fbbd6e6d5da2748a85cb42
                                                            • Opcode Fuzzy Hash: b9ea2616c179007ede4a60816b908fd5170429b6ca40dbde39455a4998286e8b
                                                            • Instruction Fuzzy Hash: 99114C74E003099FEB44EFB9D64579EBBF2FB44304F0086A9C0489F658EB745A058B91
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d3d7705a5a690775a84bcaf1f895bea31d2d7a5029444bc3eecfa20eca23fe22
                                                            • Instruction ID: 07b09231986a13636b079aac169c239ad583d4ebd37521f078ac385321c464db
                                                            • Opcode Fuzzy Hash: d3d7705a5a690775a84bcaf1f895bea31d2d7a5029444bc3eecfa20eca23fe22
                                                            • Instruction Fuzzy Hash: 6F21CBB4C1920A8FCB54EFA8D9955EEBFF0BF09300F10456AD805B7214EB345A99CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf69b0f4ac20915983b0e4ee92920c6c30a3c97894aae485f8628239c43607e6
                                                            • Instruction ID: a2ece068960e8bb3b5d3cf497f421f705192c8487520a48f5869f6bfa0f2610c
                                                            • Opcode Fuzzy Hash: bf69b0f4ac20915983b0e4ee92920c6c30a3c97894aae485f8628239c43607e6
                                                            • Instruction Fuzzy Hash: A011A579B002118FC790ABB8E54866977F0FF88721711446DE515D7726EB32CE15CBE0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3690766786.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_10fd000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                            • Instruction ID: 7c2c36183ada0bc3add8ad24e2c40fa446a10f4bc8523c6256daf8bb90ad92b1
                                                            • Opcode Fuzzy Hash: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                            • Instruction Fuzzy Hash: 3911DD75504284DFCB12CF54D9C4B15BFA2FB84314F24CAADEA894BA52C33AD44ACF62
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e6de9bf8d1192b4720ff9d99ad21979f733ef39efc5c7ae056048396c82f99aa
                                                            • Instruction ID: 9628f6d78f993e23c7f94b8bac2ad914fabdefa4cb6ba7ae12c2447002520b0b
                                                            • Opcode Fuzzy Hash: e6de9bf8d1192b4720ff9d99ad21979f733ef39efc5c7ae056048396c82f99aa
                                                            • Instruction Fuzzy Hash: 4501F571B001055FCB558E69A810AFF7FE7EFD8650F188029F508CB240CF318812CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: da274508b896adb9020d1a019eb383c2713e610feab74635a4263349f189b4e0
                                                            • Instruction ID: 642c4ff60ead18f592b5ec4e84f51a3400f7cbc35805c715464e7f45b0cc664c
                                                            • Opcode Fuzzy Hash: da274508b896adb9020d1a019eb383c2713e610feab74635a4263349f189b4e0
                                                            • Instruction Fuzzy Hash: 7401A470E007199FDF94EFB9D804AAEBBF5AF48210F10856AD419F7254E7749A018BA4
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d169b4c23589c5dfe14dd297516ad4ca2f167be3c3523d03be4b386a203e0f7f
                                                            • Instruction ID: 6a8def887b65168cf9f5fd46d6f4d1b7efab83d0d9a25acfc13843f8f73f28b5
                                                            • Opcode Fuzzy Hash: d169b4c23589c5dfe14dd297516ad4ca2f167be3c3523d03be4b386a203e0f7f
                                                            • Instruction Fuzzy Hash: 57E0E5359042068FCF188AB8B81A2EABBF5EB87711F009428D905A3452CBB1952F9A81
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 785d1bc97e1eee901a9c57b28a3345c2b0001284e0d0825dcca6925818612440
                                                            • Instruction ID: f7f37692ba63f8d1bc3509797d9321adb6826e468913ac788c7dd601d3efea13
                                                            • Opcode Fuzzy Hash: 785d1bc97e1eee901a9c57b28a3345c2b0001284e0d0825dcca6925818612440
                                                            • Instruction Fuzzy Hash: E1E0E5349081458BCB148BB5B81A2EABBF59B86311F049168C951A7546C775252B8B41
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d9464025e111c9387d3ece030c26a4dd7d3bc718eec95f03bcb6bcf6a38b48b9
                                                            • Instruction ID: 18c00c8c95467abf3e5d3458be036d49a5b5dfa81863df1a0ff39c9b93f27a2b
                                                            • Opcode Fuzzy Hash: d9464025e111c9387d3ece030c26a4dd7d3bc718eec95f03bcb6bcf6a38b48b9
                                                            • Instruction Fuzzy Hash: 6EF0523720D2888FCB021BA898204E9BFB18F821347084387D0B5D21E3C225421EABE5
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f710d36552ae67ec18bb6262867f68a4832af94da16af303a49a754911ac0665
                                                            • Instruction ID: ba8d6cad478003de63523fccfed99710bdd87650fdd3648d8e42ee3897d7e497
                                                            • Opcode Fuzzy Hash: f710d36552ae67ec18bb6262867f68a4832af94da16af303a49a754911ac0665
                                                            • Instruction Fuzzy Hash: CDE0D8E2C082408BEF188BE574160F57FB0CEE7611749508780859BD25D714D1069712
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0d5e6016295a7d9d3787095e1bd7933c6d374d9ef627b86648a12a2116cf6dca
                                                            • Instruction ID: ba37e7ab6b6e097f8fdce9a04a359c08cf2ba047a5906456f77e6b703b4a7340
                                                            • Opcode Fuzzy Hash: 0d5e6016295a7d9d3787095e1bd7933c6d374d9ef627b86648a12a2116cf6dca
                                                            • Instruction Fuzzy Hash: B5E068308253E21BCB2297749C040EEBF709DC3310B1546ABD49067041DF30155BC390
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a8c3efc6586c3c0993ce0924a75ff777a26687c17a8bf31635027d4748c185d1
                                                            • Instruction ID: 01bee33d49dbe891f419d92e91c8902dac4829102c03bb42200e91b9da9e6017
                                                            • Opcode Fuzzy Hash: a8c3efc6586c3c0993ce0924a75ff777a26687c17a8bf31635027d4748c185d1
                                                            • Instruction Fuzzy Hash: 46D05B31D2033A57CB10E7A5DC044DFFB38EED5321B514666D51437144FB706659C6E1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                            • Instruction ID: 85ac0cf176744c0088d107a7ba5a5e44c495a2c4228bc2d6ff15a1c2767af774
                                                            • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                            • Instruction Fuzzy Hash: 56C0123320C1282BA629208E7C40EA3AB8CC3C1AF4A260137F91CA3200AA429C8041B9
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 890e3f92a5dfabe5ef1d12f5dc9e530d023593dcf1aef0c3ecaffb9d58f6d841
                                                            • Instruction ID: 6d28f67fddd0a48ff7b90c797cd176a42656d98dde872cb0afe29dc814ea7289
                                                            • Opcode Fuzzy Hash: 890e3f92a5dfabe5ef1d12f5dc9e530d023593dcf1aef0c3ecaffb9d58f6d841
                                                            • Instruction Fuzzy Hash: A7D0677BB511089FDB049F98E8409DDB7B6FB9C221B548526E925A3260C6319921DBA0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2c0d0bf1820b5276af92e7a852223a181fb7a582d1d382c27d5ef1853fee4ac3
                                                            • Instruction ID: b0160796299bc1164b14286dc7f182f50741fc9df843419d9a9d30ec16233a23
                                                            • Opcode Fuzzy Hash: 2c0d0bf1820b5276af92e7a852223a181fb7a582d1d382c27d5ef1853fee4ac3
                                                            • Instruction Fuzzy Hash: 6CC0020805D7C55ED317437828765B67FF89C4724239D59C798C1CA1A7D408682A9365
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e1d054570cc58e2a5f002a3b639099f7607c4785282629230ebf8917850f9381
                                                            • Instruction ID: 0540b6982d453f11c34fdfacd5e80a9592dd26844a24bd6cb27bc57e4fa2795b
                                                            • Opcode Fuzzy Hash: e1d054570cc58e2a5f002a3b639099f7607c4785282629230ebf8917850f9381
                                                            • Instruction Fuzzy Hash: EDC01234D043064BD551F775FA4599533BAAAC0618F404954A1090F5199F74584A46B2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "$Hq$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                                            • API String ID: 0-2204202469
                                                            • Opcode ID: 9299e148b6ab996d4fd855291ce51f707f7907a65f19d0e4f18e3a2f4ce6222a
                                                            • Instruction ID: a3846857fd2876e99ec05ce956e94bc4008b96baf372ae624b65dd58f8a99c65
                                                            • Opcode Fuzzy Hash: 9299e148b6ab996d4fd855291ce51f707f7907a65f19d0e4f18e3a2f4ce6222a
                                                            • Instruction Fuzzy Hash: BD12D074E002188FDB68DF69D944B9DBBF2BF89310F2080A9D419AB365DB719E81CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "$Hq$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                                            • API String ID: 0-2204202469
                                                            • Opcode ID: 61e99b3ce8b9d9e6c80ea2d2ec12e82a7c47056e27c7fb1003296387dc182e28
                                                            • Instruction ID: 6d38c5ab523d184c153311ca4fa1b2c95aded6c7f73ca64ed8c8f86755f30c3c
                                                            • Opcode Fuzzy Hash: 61e99b3ce8b9d9e6c80ea2d2ec12e82a7c47056e27c7fb1003296387dc182e28
                                                            • Instruction Fuzzy Hash: 2412B074E002188FDB68DF69D944B9DBBF2BF89300F2081A9D419AB355DB715E81CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: "$PHq$PHq$PHq$PHq$PHq$PHq$PHq$PHq
                                                            • API String ID: 0-4082700204
                                                            • Opcode ID: 8a89822458d3a81f29b2178379bffa359554388c2e92a2d5fa0471044dddea7a
                                                            • Instruction ID: 30c01d6328ca9b5fff4b2df391534ca5e40ceb4d077432f391afdf7e11c932e6
                                                            • Opcode Fuzzy Hash: 8a89822458d3a81f29b2178379bffa359554388c2e92a2d5fa0471044dddea7a
                                                            • Instruction Fuzzy Hash: 2E329074E00218CFDB68DF69C984B9DBBB2BF89310F1080A9D819AB355DB719E85CF54
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8f9adc3632c6029370fd276f7ecf697686321c6b90f6208693c41059ebbe81be
                                                            • Instruction ID: 48d9c6d94dc7f9b6212904b63a3575dc00df5ca2d6b404b531feda2873fea4b4
                                                            • Opcode Fuzzy Hash: 8f9adc3632c6029370fd276f7ecf697686321c6b90f6208693c41059ebbe81be
                                                            • Instruction Fuzzy Hash: AB528B74E012298FDB68DF69C984BDDBBB2BB89300F1085E9D409AB254DB359E81CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3098682cec6c0194d50857f743c51f14f109743ba0e3edc28e318bddd31a5e3c
                                                            • Instruction ID: e07d832c0fa4f9832480c715e07ac97ccd5dac1f87c1ebf91dc15bda9fee182f
                                                            • Opcode Fuzzy Hash: 3098682cec6c0194d50857f743c51f14f109743ba0e3edc28e318bddd31a5e3c
                                                            • Instruction Fuzzy Hash: 91C1B174E00218CFEB54DFA5D994B9DBBB2BF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1592fdede010e8e035eae4a750ff462a56655f26915fba6f884e4360182d815d
                                                            • Instruction ID: ae8428e98713b00672302594c5868d31640895a188ef9f242c746faba5f75ae0
                                                            • Opcode Fuzzy Hash: 1592fdede010e8e035eae4a750ff462a56655f26915fba6f884e4360182d815d
                                                            • Instruction Fuzzy Hash: B4C1A174E00218CFEB54DFA5D994B9DBBB2BF89304F2081A9D409AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 59b7645f7da9f5095c98c590de5db0dcbabb204b44e0e3a4646f38f828d592dc
                                                            • Instruction ID: f7124faebf58ea29e38197d10c7cf5556a2bb38985e20c00bb67192380e26d5f
                                                            • Opcode Fuzzy Hash: 59b7645f7da9f5095c98c590de5db0dcbabb204b44e0e3a4646f38f828d592dc
                                                            • Instruction Fuzzy Hash: 24C1A274E00218CFDB54DFA5D994B9DBBB2BF89304F2080A9D809AB359DB359E85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6e8cfa8eb5fe1715377210e0b23db63a8f7e99f3da77c163bf77bd79794bd160
                                                            • Instruction ID: a6c2b2a5e002470ffc1c35d50e4b6b4a479f0f9e84f84cbbbf8e220cf33fb20b
                                                            • Opcode Fuzzy Hash: 6e8cfa8eb5fe1715377210e0b23db63a8f7e99f3da77c163bf77bd79794bd160
                                                            • Instruction Fuzzy Hash: C5C1A174E00218CFDB54DFA5D994B9DBBF2AF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eb556c104316429b93ad8876a9041ca628092648be9da187d6cac4535bc33500
                                                            • Instruction ID: febe8cc883fc539cc8596964baa09353f54449e2e81ac3be7050983113ac8454
                                                            • Opcode Fuzzy Hash: eb556c104316429b93ad8876a9041ca628092648be9da187d6cac4535bc33500
                                                            • Instruction Fuzzy Hash: B7C19174E00218CFDB54DFA5D994BADBBB2BF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d5c7a9d52142be2f549f01785f05e5dce8df0f59eb140395f63ef187fd665952
                                                            • Instruction ID: 9ba82464f228e18fc677e0079e23b250e177d30873f8f9ef303194e76faab995
                                                            • Opcode Fuzzy Hash: d5c7a9d52142be2f549f01785f05e5dce8df0f59eb140395f63ef187fd665952
                                                            • Instruction Fuzzy Hash: 94C1A174E00218CFDB54DFA5D994B9DBBB2BF89304F2080A9D409AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f789ad6fe2b305b328cb300ab8e2a35cefb9d91b4fe2541869bfd7abdcf0da9
                                                            • Instruction ID: 302edf9320596f88048e6157c1cef3bbc5eb4e12afa1e7b6465c892fd09934cb
                                                            • Opcode Fuzzy Hash: 5f789ad6fe2b305b328cb300ab8e2a35cefb9d91b4fe2541869bfd7abdcf0da9
                                                            • Instruction Fuzzy Hash: C4C19274E00218CFDB54DFA5D954B9DBBB2BF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d60ffc38468135c28206265d79414666b58f2684fc530003e97cff012cd48758
                                                            • Instruction ID: e60a0294d10660bf2643f25babb3352300d5ae1ba39e496e70e765b08c776dab
                                                            • Opcode Fuzzy Hash: d60ffc38468135c28206265d79414666b58f2684fc530003e97cff012cd48758
                                                            • Instruction Fuzzy Hash: D5C1A074E00218CFDB54DFA5D954BADBBB2BF89304F2081A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 385b819f4f56f52206bcb2dc0c75ce67dae25ee6c36d014c970f06f8c2259dd9
                                                            • Instruction ID: 97c81583706e4f38c2ea122c0c761e235c7e82cf085b7dcf133fa36b71931edc
                                                            • Opcode Fuzzy Hash: 385b819f4f56f52206bcb2dc0c75ce67dae25ee6c36d014c970f06f8c2259dd9
                                                            • Instruction Fuzzy Hash: 57C1B174E00218CFDB54DFA5D954BADBBB2BF89304F2081A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: de52fa5a4464fdc57f07d569694dc4b6bd7cda192c5875f87c2b3b57c5c1d3d4
                                                            • Instruction ID: 4fd4b54b86848db30f7da10cab656bcf55597a8e12382bafcab46273c6e1541d
                                                            • Opcode Fuzzy Hash: de52fa5a4464fdc57f07d569694dc4b6bd7cda192c5875f87c2b3b57c5c1d3d4
                                                            • Instruction Fuzzy Hash: 65C19074E00218CFDB54DFA5D954BADBBB2AF89304F2080A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1e7b3ac586141abb6f60be15db17ff6d42f331d76ddbf0b3534b5030266ffa02
                                                            • Instruction ID: 2b9b43fe899aa5bf1645644c5f70f0a1b8269d2da296320356f79359243486f1
                                                            • Opcode Fuzzy Hash: 1e7b3ac586141abb6f60be15db17ff6d42f331d76ddbf0b3534b5030266ffa02
                                                            • Instruction Fuzzy Hash: B4C1B074E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 96cb21fb8457953d1852bf3a28dade25340df2c7412deb32bcd7ccdb1cedeb5e
                                                            • Instruction ID: ec33faa051ece7cb24e8d684303109ef6f85526ed5053fbeb66c2203978fbb84
                                                            • Opcode Fuzzy Hash: 96cb21fb8457953d1852bf3a28dade25340df2c7412deb32bcd7ccdb1cedeb5e
                                                            • Instruction Fuzzy Hash: 4DC19074E00218CFDB54DFA5D994BADBBF2AF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 69a79a28da95782fc3ca4b4f2c07698c9f2c16227a719ca65c5d8115bfc65426
                                                            • Instruction ID: 13d731ea90ee35f605e69cad38ded625d524175c5ba60848dcb53bd39aac492e
                                                            • Opcode Fuzzy Hash: 69a79a28da95782fc3ca4b4f2c07698c9f2c16227a719ca65c5d8115bfc65426
                                                            • Instruction Fuzzy Hash: 13C19074E00218CFDB54DFA5D954BADBBB2BF89304F2080A9D809AB359DB359E85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7596ea4d9f19ea4749700621cd5875186470f9515e3d1728633eb77682c0f3e3
                                                            • Instruction ID: c33d8b56a484564ebfedd37d755d012f4a9e511d710e492aed6fe9f19c419586
                                                            • Opcode Fuzzy Hash: 7596ea4d9f19ea4749700621cd5875186470f9515e3d1728633eb77682c0f3e3
                                                            • Instruction Fuzzy Hash: 15C1A174E00218CFDB54DFA5D954BADBBB2BF89304F2081A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3304c89335e639a66c2245b1e8222ac4634a5c9b9d69edb8574b4a7952645c83
                                                            • Instruction ID: eb388db26ec660f8c217c9fd55e73363b0df8e470c5853974bdd3d9ec85a2f0d
                                                            • Opcode Fuzzy Hash: 3304c89335e639a66c2245b1e8222ac4634a5c9b9d69edb8574b4a7952645c83
                                                            • Instruction Fuzzy Hash: 53C1A174E00218CFDB54DFA5D954BADBBB2BF89304F2080A9D819AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 956d5b5bc639288275fc8a9ebde3d58bf183ca2802d7dad40f54dced2baeb574
                                                            • Instruction ID: 702836cf84bb2c729727102e3bc172fc75e01f5c69987a33932c330009d0bf01
                                                            • Opcode Fuzzy Hash: 956d5b5bc639288275fc8a9ebde3d58bf183ca2802d7dad40f54dced2baeb574
                                                            • Instruction Fuzzy Hash: 14C19174E00218CFEB54DFA5D994B9DBBF2AF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ed55971198d4bac0dcd656e92cb37bf31c8eac6109e7a653f905914f4d7aabb
                                                            • Instruction ID: a58f38b57e6cabee3ab03147deb83c79a22efb0fed7e77e39a0ebd3f8fd570a5
                                                            • Opcode Fuzzy Hash: 3ed55971198d4bac0dcd656e92cb37bf31c8eac6109e7a653f905914f4d7aabb
                                                            • Instruction Fuzzy Hash: 4DC19074E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 48a6e01d9fba2896e4958a3e2ad2d74937a2860e4e6b19b88cdf20da2b26f641
                                                            • Instruction ID: b3d187b7f3bbc9844734c1979be6c4cae0439904e08c5e226a06faf20a2a4141
                                                            • Opcode Fuzzy Hash: 48a6e01d9fba2896e4958a3e2ad2d74937a2860e4e6b19b88cdf20da2b26f641
                                                            • Instruction Fuzzy Hash: 3BC18F74E00218CFDB54DFA5D994BADBBF2AF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e9dd100530182f8128fd1b8df6ffa818ad595fa3cbda356db712fc7d0c8b6e08
                                                            • Instruction ID: 06f634d8efa6a55a5b0514cafebd76a9b8d61a7ce4f95ce70bb9524eac681189
                                                            • Opcode Fuzzy Hash: e9dd100530182f8128fd1b8df6ffa818ad595fa3cbda356db712fc7d0c8b6e08
                                                            • Instruction Fuzzy Hash: 17C19F74E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D819AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cce9c8655988b52e0e7746784a96b58f4133277ff6178e7ace63c50cafb777f0
                                                            • Instruction ID: 681c46b55844b47b768f9a09187e348a84552ddc07dfe45cd7f0bc3d45546735
                                                            • Opcode Fuzzy Hash: cce9c8655988b52e0e7746784a96b58f4133277ff6178e7ace63c50cafb777f0
                                                            • Instruction Fuzzy Hash: 03C19074E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D409AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d0ef4122ed917d8de2c49cc7c43515e62098dad4e0b740c2a44dfef09bc8b3d7
                                                            • Instruction ID: 42a73a1b1b08f67acec98aecfdbbc675c4d79bcdd30eb41f1b53f092891dbc0f
                                                            • Opcode Fuzzy Hash: d0ef4122ed917d8de2c49cc7c43515e62098dad4e0b740c2a44dfef09bc8b3d7
                                                            • Instruction Fuzzy Hash: 53C19F74E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5fd431e12ed774371962a3fec398bc4d6072db8dd216afe861a5821cb0140f0d
                                                            • Instruction ID: 64dfff6f9960a91f440f781fd4960c3b15a4707442e951a387002024a2c5f43d
                                                            • Opcode Fuzzy Hash: 5fd431e12ed774371962a3fec398bc4d6072db8dd216afe861a5821cb0140f0d
                                                            • Instruction Fuzzy Hash: D9C19174E00218CFDB54DFA5D954B9DBBF2AF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c4664b631ff0dadc658cc3a13b6e3dc9992e0bc62dcda084b9a769072d9fc373
                                                            • Instruction ID: eb3e7b83879729d06ca194df98b24c58c917829802428f7b79e66427a463a106
                                                            • Opcode Fuzzy Hash: c4664b631ff0dadc658cc3a13b6e3dc9992e0bc62dcda084b9a769072d9fc373
                                                            • Instruction Fuzzy Hash: A6C19174E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D409AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e302fbc33112da3b10c4c6ef0d41a71a3fc2101b64a03aa505afab536a807f63
                                                            • Instruction ID: 930807df247f4e41763b602da2f29abdc757b6eedffc29ddd5647069de606dd6
                                                            • Opcode Fuzzy Hash: e302fbc33112da3b10c4c6ef0d41a71a3fc2101b64a03aa505afab536a807f63
                                                            • Instruction Fuzzy Hash: FAC19074E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D819AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4c8827be526b8bdc8de3552bc757d20cb83c84ab6d3ea597cfbeea675a7c1489
                                                            • Instruction ID: eed19b3cdd61ac1b6b55b7ff82befa2fd24371add396cde0c4fb4cff6bb59f18
                                                            • Opcode Fuzzy Hash: 4c8827be526b8bdc8de3552bc757d20cb83c84ab6d3ea597cfbeea675a7c1489
                                                            • Instruction Fuzzy Hash: E6C1A074E00218CFDB54DFA5D994BADBBF2AF89304F2080A9D419AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 140f0f2efefc17d49674fa952d3ba8f1f15e94c9ee000a80dce44279dff852e4
                                                            • Instruction ID: 2b0237ce870837a2fdc24a5ef9e632370c8b7dd5d934c813639e76927e6bea1e
                                                            • Opcode Fuzzy Hash: 140f0f2efefc17d49674fa952d3ba8f1f15e94c9ee000a80dce44279dff852e4
                                                            • Instruction Fuzzy Hash: 5FC1A074E00218CFDB54DFA5D994BADBBF2AF89304F2080A9D409AB359DB359E85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 15e465bfb085f1118c41f7698ead5fcefef67ec3ec4ec8db7e172b280951ec92
                                                            • Instruction ID: 22bd97ec1e74c5f1caf0bc3c9916e70b5f9a74a85482d1a977db49d61cc272b0
                                                            • Opcode Fuzzy Hash: 15e465bfb085f1118c41f7698ead5fcefef67ec3ec4ec8db7e172b280951ec92
                                                            • Instruction Fuzzy Hash: 64C19074E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D819AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8cc8250fbab95f5212e298d6c429ecdb364f6b5779e6e2d11138e7df4f259cae
                                                            • Instruction ID: e070de34382919b8c27af27bad7e679b96a535c774a4f647b785fe7f98fc4956
                                                            • Opcode Fuzzy Hash: 8cc8250fbab95f5212e298d6c429ecdb364f6b5779e6e2d11138e7df4f259cae
                                                            • Instruction Fuzzy Hash: 86C18F74E00318CFDB54DFA5D954BADBBB2BF89304F1081A9D809AB359DB359A81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ed6bff775d2458b19eadbaf00a872f0ff8c1d0edd2e1bed559e96051b4af49a1
                                                            • Instruction ID: 0d0fe7579b0479a3278a4b2805af726d4d7169d3e206b4abd3d8a456e837724c
                                                            • Opcode Fuzzy Hash: ed6bff775d2458b19eadbaf00a872f0ff8c1d0edd2e1bed559e96051b4af49a1
                                                            • Instruction Fuzzy Hash: C8C19F74E00318CFDB54DFA5D954BADBBB2BF89304F2080A9D809AB359DB359A85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 00faeb1211c038ffa77c76ad7756b3152b626d6d86c7e2aa6a14035dffef1856
                                                            • Instruction ID: 4cd78fe83b516b5846dee1b17ab89335ead727bca478b71f06b730e3ec6d3870
                                                            • Opcode Fuzzy Hash: 00faeb1211c038ffa77c76ad7756b3152b626d6d86c7e2aa6a14035dffef1856
                                                            • Instruction Fuzzy Hash: 93C19074E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D409AB359DB359E85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 20bd9aeffe86c78c1dce731e87f19c17943372277a01218f95fb6dfcdf6ffb2b
                                                            • Instruction ID: e68b0d17e6c052cd682d3cf84b8bc3669301989e857a4e944f6f87c108f7da50
                                                            • Opcode Fuzzy Hash: 20bd9aeffe86c78c1dce731e87f19c17943372277a01218f95fb6dfcdf6ffb2b
                                                            • Instruction Fuzzy Hash: A1C19174E00218CFDB54DFA5D994B9DBBF2AF89304F2080A9D409AB359DB359E85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 76e974152596de393a8bfb471ddb81037e452da3c25d065527d9c96ac34cf78f
                                                            • Instruction ID: 24b76e20ad35e68c2869eb9ef702a0e556ee86c0d30d5a8ae00eb880d06a3fa1
                                                            • Opcode Fuzzy Hash: 76e974152596de393a8bfb471ddb81037e452da3c25d065527d9c96ac34cf78f
                                                            • Instruction Fuzzy Hash: DCC19F74E00218CFDB54DFA5D954BADBBF2AF89304F2081A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b49ff27e4c62848c685e50a6bcdce8f4f04e35ad222ee662dae3b79e23ff72e7
                                                            • Instruction ID: ce21840bd287aabfe8582570c617997ba80f2aed18b6488e02429dc8280ad8ef
                                                            • Opcode Fuzzy Hash: b49ff27e4c62848c685e50a6bcdce8f4f04e35ad222ee662dae3b79e23ff72e7
                                                            • Instruction Fuzzy Hash: 21C19E74E00218CFDB54DFA5D954BADBBB2BF89304F2081A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0d3d29fbb5f847ff9cf24015598470efbd4aad45b54da19253d506baaec8bc2
                                                            • Instruction ID: 02bbcade10f734ffcdd57e22efdb9abb84f43e111ae3a30ab5ead390a221a7f6
                                                            • Opcode Fuzzy Hash: a0d3d29fbb5f847ff9cf24015598470efbd4aad45b54da19253d506baaec8bc2
                                                            • Instruction Fuzzy Hash: 76C1A074E00218CFDB55DFA5D954BADBBF2AF89304F2080A9D809AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6760debb712ec3a12f3596db1018893ca37f7414424da9a3aad7e2012379b550
                                                            • Instruction ID: 53d11c338f1aa267cdc35afcd519aa6141c099aaa8e46f59e446622cc6247d55
                                                            • Opcode Fuzzy Hash: 6760debb712ec3a12f3596db1018893ca37f7414424da9a3aad7e2012379b550
                                                            • Instruction Fuzzy Hash: ACC19074E00218CFDB54DFA5D954BADBBF2AF89304F2080A9D809AB359DB359E85CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694634274.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_6790000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 41985c3aaec63a3fb6800af5b60962435f219402289882c0b4f1f5af5c4ac5bd
                                                            • Instruction ID: 8416d4f618adedf642b297a70eb1392b36369a920722f8f14516ce951c699d0a
                                                            • Opcode Fuzzy Hash: 41985c3aaec63a3fb6800af5b60962435f219402289882c0b4f1f5af5c4ac5bd
                                                            • Instruction Fuzzy Hash: B2C19074E00218CFDB54DFA5D994BADBBF2AF89304F2080A9D409AB359DB359E81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 12b8dccd1a1c238776a1a8a40aef14e8f94227495435b4c2adadbdc660c1342b
                                                            • Instruction ID: c039c2e998005484f502d5c4863e28e7f7182bab9f2146ff5ecaeccf14ff523b
                                                            • Opcode Fuzzy Hash: 12b8dccd1a1c238776a1a8a40aef14e8f94227495435b4c2adadbdc660c1342b
                                                            • Instruction Fuzzy Hash: A2B17378E00218CFDB54DFA9D994A9DBBB2FF89310F1081A9D819AB365DB31AD41CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a79463cd35faca190a3febc1a1b1de51dd4e02b4c210c9d3451b8a6e8fc122b3
                                                            • Instruction ID: 5c638dccdde4589d9a1f202e011049cb323076c208eb20e458af84fcbc8b1097
                                                            • Opcode Fuzzy Hash: a79463cd35faca190a3febc1a1b1de51dd4e02b4c210c9d3451b8a6e8fc122b3
                                                            • Instruction Fuzzy Hash: 07519274E006088FDB48DFAAD984A9DBBF2FF89310F14C169D818AB365DB349941CF50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3694886923.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_67c0000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cfa9a1ee114565083473bbb14994f896f484b43fc73aca6112c832fb2d54da04
                                                            • Instruction ID: 5c6cd917154415267abddd2fa1fa9535f118f16785ba6403964ea486e37503e5
                                                            • Opcode Fuzzy Hash: cfa9a1ee114565083473bbb14994f896f484b43fc73aca6112c832fb2d54da04
                                                            • Instruction Fuzzy Hash: E9D09234D0425DDBDF24EFA8E8407AEB3B2FF96324F0024AAC508B7240D7309E518A16
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.3691056160.0000000001140000.00000040.00000800.00020000.00000000.sdmp, Offset: 01140000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_1140000_MV GOLDEN SCHULTE DETAILS.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: \;q$\;q$\;q$\;q
                                                            • API String ID: 0-2933265366
                                                            • Opcode ID: d6ffbf002ee9bf003ef2bed5e875f159fd5f980423d0bc8fd198816a3ae7a607
                                                            • Instruction ID: f70ac9301fcd488a6a0156a7fdad521b6d4ccc2274e55fd441aeda7092df9a79
                                                            • Opcode Fuzzy Hash: d6ffbf002ee9bf003ef2bed5e875f159fd5f980423d0bc8fd198816a3ae7a607
                                                            • Instruction Fuzzy Hash: 8C0171317001158F9B2C8A2DC45492A77F7AF9AA68719427AE502CF3B5DF71DC42C751