Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BZuk2UI1RC.exe

Overview

General Information

Sample name:BZuk2UI1RC.exe
renamed because original name is a hash value
Original sample name:44be52262ede26fde4f5ada4506d03cf.exe
Analysis ID:1579647
MD5:44be52262ede26fde4f5ada4506d03cf
SHA1:7ad5a829db8593b5d074a43c2a8b4782cb1be55b
SHA256:bf11c3992f87146955b1ee149f07a75ab1bed65046704813b8e837c55e171486
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • BZuk2UI1RC.exe (PID: 3184 cmdline: "C:\Users\user\Desktop\BZuk2UI1RC.exe" MD5: 44BE52262EDE26FDE4F5ADA4506D03CF)
    • WerFault.exe (PID: 3832 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 1688 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["necklacebudi.lat", "sweepyribs.lat", "sustainskelet.lat", "grannyejh.lat", "crosshuaht.lat", "aspecteirs.lat", "energyaffai.lat", "discokeyus.lat", "rapeflowwj.lat"], "Build id": "4h5VfH--"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    00000000.00000002.1677960315.0000000000670000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:17.912347+010020283713Unknown Traffic192.168.2.84970423.55.153.106443TCP
      2024-12-23T07:01:20.958942+010020283713Unknown Traffic192.168.2.849705172.67.157.254443TCP
      2024-12-23T07:01:22.460389+010020283713Unknown Traffic192.168.2.849706172.67.157.254443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:21.721403+010020546531A Network Trojan was detected192.168.2.849705172.67.157.254443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:21.721403+010020498361A Network Trojan was detected192.168.2.849705172.67.157.254443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:15.295172+010020583541Domain Observed Used for C2 Detected192.168.2.8512511.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:15.763025+010020583581Domain Observed Used for C2 Detected192.168.2.8546421.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:14.869437+010020583601Domain Observed Used for C2 Detected192.168.2.8496111.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:15.154639+010020583621Domain Observed Used for C2 Detected192.168.2.8581521.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:14.590969+010020583641Domain Observed Used for C2 Detected192.168.2.8506701.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:15.010018+010020583701Domain Observed Used for C2 Detected192.168.2.8499581.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:15.977070+010020583741Domain Observed Used for C2 Detected192.168.2.8502511.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:15.437108+010020583761Domain Observed Used for C2 Detected192.168.2.8508781.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:14.444489+010020583781Domain Observed Used for C2 Detected192.168.2.8621741.1.1.153UDP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-23T07:01:18.693447+010028586661Domain Observed Used for C2 Detected192.168.2.84970423.55.153.106443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: BZuk2UI1RC.exeAvira: detected
      Source: 0.2.BZuk2UI1RC.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["necklacebudi.lat", "sweepyribs.lat", "sustainskelet.lat", "grannyejh.lat", "crosshuaht.lat", "aspecteirs.lat", "energyaffai.lat", "discokeyus.lat", "rapeflowwj.lat"], "Build id": "4h5VfH--"}
      Source: BZuk2UI1RC.exeVirustotal: Detection: 62%Perma Link
      Source: BZuk2UI1RC.exeReversingLabs: Detection: 52%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: BZuk2UI1RC.exeJoe Sandbox ML: detected
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: crosshuaht.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: sustainskelet.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: aspecteirs.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: energyaffai.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: necklacebudi.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: discokeyus.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: grannyejh.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: sweepyribs.lat
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmpString decryptor: 4h5VfH--

      Compliance

      barindex
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeUnpacked PE file: 0.2.BZuk2UI1RC.exe.400000.0.unpack
      Source: BZuk2UI1RC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: unknownHTTPS traffic detected: 23.55.153.106:443 -> 192.168.2.8:49704 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.157.254:443 -> 192.168.2.8:49705 version: TLS 1.2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx esi, byte ptr [ebp+ebx-10h]0_2_0043C767
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]0_2_0040B70C
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then jmp eax0_2_0042984F
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]0_2_00423860
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov edx, ecx0_2_00438810
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh0_2_00438810
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh0_2_00438810
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then test eax, eax0_2_00438810
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], al0_2_0041682D
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]0_2_0041682D
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]0_2_0041682D
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ecx], bp0_2_0041D83A
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then push C0BFD6CCh0_2_00423086
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then push C0BFD6CCh0_2_00423086
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_0042B170
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]0_2_004179C1
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], E5FE86B7h0_2_0043B1D0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, eax0_2_0043B1D0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_004291DD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_004291DD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, eax0_2_00405990
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebp, eax0_2_00405990
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, esi0_2_00422190
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00422190
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_00422190
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CA49
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0042DA53
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]0_2_00416263
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]0_2_00415220
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then push esi0_2_00427AD3
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CAD0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ebx], ax0_2_0041B2E0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then push ebx0_2_0043CA93
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0041CB40
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [esi], cx0_2_0041CB40
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00428B61
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CB11
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0042CB22
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]0_2_0043F330
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, eax0_2_0040DBD9
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, eax0_2_0040DBD9
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_00417380
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h0_2_0041D380
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp al, 2Eh0_2_00426B95
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00435450
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_00417380
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then push 00000000h0_2_00429C2B
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_004291DD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_004291DD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_004074F0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_004074F0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_0043ECA0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 9C259492h0_2_004385E0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then jmp eax0_2_004385E0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]0_2_00417DEE
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, eax0_2_00409580
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ebp+00h], ax0_2_00409580
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then jmp dword ptr [0044450Ch]0_2_00418591
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]0_2_00428D93
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then xor edi, edi0_2_0041759F
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]0_2_0041C653
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov edx, ebp0_2_00425E70
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then jmp dword ptr [004455F4h]0_2_00425E30
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, eax0_2_0043AEC0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al0_2_00408F50
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], bl0_2_00408F50
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_0042A700
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0041BF14
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]0_2_0041E7C0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx eax, word ptr [edx]0_2_004197C2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [edi], dx0_2_004197C2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [esi], cx0_2_004197C2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, ebx0_2_0042DFE9
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then jmp ecx0_2_0040BFFD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov esi, eax0_2_00415799
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, eax0_2_00415799
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_0043EFB0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_0213F217
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [eax], cx0_2_0211D230
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [esi], cx0_2_0211D230
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+423C9D38h]0_2_0211EA27
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx eax, word ptr [edx]0_2_02119A29
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [edi], dx0_2_02119A29
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [esi], cx0_2_02119A29
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, ebx0_2_0212E250
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov edx, ecx0_2_02138A77
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 5E874B5Fh0_2_02138A77
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp dword ptr [edx+edi*8], BC9C9AFCh0_2_02138A77
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then test eax, eax0_2_02138A77
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then jmp ecx0_2_0210C264
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then jmp eax0_2_02129AB5
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ecx], bp0_2_0211DAB8
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+6D2CC012h]0_2_02114ACD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then push C0BFD6CCh0_2_021232ED
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], al0_2_02116B2A
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+6D2CC012h]0_2_02114BD2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_0212B3D7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, esi0_2_021223F7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_021223F7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_021223F7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, eax0_2_02105BF7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebp, eax0_2_02105BF7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0Dh]0_2_02124031
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx-7D4F88C7h]0_2_02118055
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov eax, dword ptr [0044473Ch]0_2_0211C8BA
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov edx, ebp0_2_021260D7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, eax0_2_0213B127
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then lea edx, dword ptr [ecx+01h]0_2_0210B973
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0211C17B
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_0212A967
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then xor byte ptr [esp+eax+17h], al0_2_021091B7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], bl0_2_021091B7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, eax0_2_0210DE40
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ebx, eax0_2_0210DE40
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp al, 2Eh0_2_02126E96
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], AF697AECh0_2_02114E96
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], E785F9BAh0_2_02114E87
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_021356B7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+68E75405h]0_2_0213EF07
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18h]0_2_02116F35
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ebx, byte ptr [esp+ecx-75h]0_2_02116F35
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]0_2_02107757
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]0_2_02107757
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then push 00000000h0_2_02129F40
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov eax, dword ptr [ebp-68h]0_2_02128FA0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, eax0_2_02115FD3
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, eax0_2_021097E7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ebp+00h], ax0_2_021097E7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]0_2_02117C28
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then xor edi, edi0_2_02117C28
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov esi, eax0_2_02115C41
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_02129444
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov ecx, dword ptr [ebp-20h]0_2_02129444
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+61D008CBh]0_2_02115487
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0212CCB0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [esi], al0_2_0212DCBC
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then jmp dword ptr [004455F4h]0_2_021264DA
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-7D4F867Fh]0_2_021164CA
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then push esi0_2_02127D1A
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0212CD37
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [ebx], ax0_2_0211B547
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0212CD78
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax]0_2_0213F597
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov byte ptr [edi], cl0_2_0212CD89
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then mov word ptr [eax], cx0_2_02128DC8
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then cmp word ptr [ebx+edi+02h], 0000h0_2_0211D5E7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-7D4F867Fh]0_2_021175E7

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2058378 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sweepyribs .lat) : 192.168.2.8:62174 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058364 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) : 192.168.2.8:50670 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058370 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacebudi .lat) : 192.168.2.8:49958 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058376 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sustainskelet .lat) : 192.168.2.8:50878 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058358 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crosshuaht .lat) : 192.168.2.8:54642 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058360 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) : 192.168.2.8:49611 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058374 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rapeflowwj .lat) : 192.168.2.8:50251 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058362 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (energyaffai .lat) : 192.168.2.8:58152 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2058354 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (aspecteirs .lat) : 192.168.2.8:51251 -> 1.1.1.1:53
      Source: Network trafficSuricata IDS: 2858666 - Severity 1 - ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup : 192.168.2.8:49704 -> 23.55.153.106:443
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.8:49705 -> 172.67.157.254:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.8:49705 -> 172.67.157.254:443
      Source: Malware configuration extractorURLs: necklacebudi.lat
      Source: Malware configuration extractorURLs: sweepyribs.lat
      Source: Malware configuration extractorURLs: sustainskelet.lat
      Source: Malware configuration extractorURLs: grannyejh.lat
      Source: Malware configuration extractorURLs: crosshuaht.lat
      Source: Malware configuration extractorURLs: aspecteirs.lat
      Source: Malware configuration extractorURLs: energyaffai.lat
      Source: Malware configuration extractorURLs: discokeyus.lat
      Source: Malware configuration extractorURLs: rapeflowwj.lat
      Source: Joe Sandbox ViewIP Address: 172.67.157.254 172.67.157.254
      Source: Joe Sandbox ViewIP Address: 23.55.153.106 23.55.153.106
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49705 -> 172.67.157.254:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49704 -> 23.55.153.106:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49706 -> 172.67.157.254:443
      Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: lev-tolstoi.com
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ^Content-Security-Policydefault-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=Nonesessionid=014b802d766e738a21f540cf; Path=/; Secure; SameSite=NoneSet-CookienginxServerRetry-AfterProxy-SupportProxy-AuthenticateP3PLocationETagAuthentication-InfoAgeAccept-RangesLast-ModifiedMon, 26 Jul 1997 05:00:00 GMTExpiresContent-RangeContent-MD5Content-LocationContent-LanguageContent-Encodingtext/html; charset=UTF-8Content-Type35121Content-LengthAllowWarningViaUpgradeTransfer-EncodingTrailerPragmaKeep-AliveMon, 23 Dec 2024 06:01:18 GMTDateProxy-ConnectioncloseConnectionno-cacheCache-Control equals www.youtube.com (Youtube)
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq.cn https://steambroadcastchat.akamaized.net http://127.0.0.1:27060 ws://127.0.0.1:27060; frame-src 'self' steam: https://store.steampowered.com/ https://help.steampowered.com/ https://login.steampowered.com/ https://checkout.steampowered.com/ https://www.youtube.com https://www.google.com https://sketchfab.com https://player.vimeo.com https://medal.tv https://www.google.com/recaptcha/ https://recaptcha.net/recaptcha/; frame-ancestors 'self' https://store.steampowered.com/; equals www.youtube.com (Youtube)
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: heckout.steampowered.com/ https://www.youtube.com https: equals www.youtube.com (Youtube)
      Source: global trafficDNS traffic detected: DNS query: sweepyribs.lat
      Source: global trafficDNS traffic detected: DNS query: grannyejh.lat
      Source: global trafficDNS traffic detected: DNS query: discokeyus.lat
      Source: global trafficDNS traffic detected: DNS query: necklacebudi.lat
      Source: global trafficDNS traffic detected: DNS query: energyaffai.lat
      Source: global trafficDNS traffic detected: DNS query: aspecteirs.lat
      Source: global trafficDNS traffic detected: DNS query: sustainskelet.lat
      Source: global trafficDNS traffic detected: DNS query: crosshuaht.lat
      Source: global trafficDNS traffic detected: DNS query: rapeflowwj.lat
      Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
      Source: global trafficDNS traffic detected: DNS query: lev-tolstoi.com
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: lev-tolstoi.com
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:27060
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/privacy_agreement/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
      Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.valvesoftware.com/legal.htm
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.cS
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://broadcast.st.dl.eccdnx.com
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.fastly.steamstatic.ck
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://checkout.steampowered.com/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S&amp
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crosshuaht.lat:443/api
      Source: BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.co
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/en/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1530326181.0000000000630000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1530326181.0000000000630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/I
      Source: BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/L
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522449689.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com/api
      Source: BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com:443/api
      Source: BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lev-tolstoi.com:443/apiiD;
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lv.queniujq.cn
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://medal.tv
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://player.vimeo.com
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rapeflowwj.lat:443/api
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net/recaptcha/;
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sketchfab.com
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast-test.akamaized.net
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcast.akamaized.net
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steambroadcastchat.akamaized.net
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/discussions/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/market/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/my/wishlist/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/p
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/workshop/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900
      Source: BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steamp
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522449689.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499375682.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/about/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/explore/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/legal/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/mobile
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/news/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/points/shop/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privacy_agreement/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/stats/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/steam_refunds/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sustainskelet.lat:443/apiD;
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sweepyribs.lat/apiZ
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
      Source: BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
      Source: BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com
      Source: BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownHTTPS traffic detected: 23.55.153.106:443 -> 192.168.2.8:49704 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 172.67.157.254:443 -> 192.168.2.8:49705 version: TLS 1.2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,0_2_004329C0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004329C0 OpenClipboard,GetClipboardData,GlobalLock,GetWindowLongW,GlobalUnlock,CloseClipboard,0_2_004329C0

      System Summary

      barindex
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000002.1677960315.0000000000670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004088500_2_00408850
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0040ACF00_2_0040ACF0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004238600_2_00423860
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004388100_2_00438810
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041682D0_2_0041682D
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004288CB0_2_004288CB
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043D8800_2_0043D880
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004218A00_2_004218A0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004309400_2_00430940
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004039700_2_00403970
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004209390_2_00420939
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004179C10_2_004179C1
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004231C20_2_004231C2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004241C00_2_004241C0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043B1D00_2_0043B1D0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004291DD0_2_004291DD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043D9800_2_0043D980
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004059900_2_00405990
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004221900_2_00422190
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043D9970_2_0043D997
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043D9990_2_0043D999
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004091B00_2_004091B0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042CA490_2_0042CA49
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042DA530_2_0042DA53
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004162630_2_00416263
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0040EA100_2_0040EA10
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004152200_2_00415220
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042CAD00_2_0042CAD0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004252DD0_2_004252DD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041B2E00_2_0041B2E0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004062800_2_00406280
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043DA800_2_0043DA80
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041E2900_2_0041E290
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041CB400_2_0041CB40
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043D34D0_2_0043D34D
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00426B500_2_00426B50
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043DB600_2_0043DB60
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00436B080_2_00436B08
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042830D0_2_0042830D
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042CB110_2_0042CB11
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004043200_2_00404320
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042CB220_2_0042CB22
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004253270_2_00425327
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004083300_2_00408330
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043F3300_2_0043F330
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042A33F0_2_0042A33F
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0040DBD90_2_0040DBD9
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004243800_2_00424380
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041FC750_2_0041FC75
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041DC000_2_0041DC00
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00429C2B0_2_00429C2B
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004291DD0_2_004291DD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004074F00_2_004074F0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041148F0_2_0041148F
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042AC900_2_0042AC90
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043ECA00_2_0043ECA0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0040CD460_2_0040CD46
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004375000_2_00437500
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004225100_2_00422510
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00417DEE0_2_00417DEE
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00437DF00_2_00437DF0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004095800_2_00409580
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041759F0_2_0041759F
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00425E700_2_00425E70
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00436E740_2_00436E74
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004276030_2_00427603
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00425E300_2_00425E30
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004286C00_2_004286C0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043AEC00_2_0043AEC0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004266D00_2_004266D0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004236E20_2_004236E2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00405EE00_2_00405EE0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041DE800_2_0041DE80
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00402F500_2_00402F50
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00420F500_2_00420F50
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00438F590_2_00438F59
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004067100_2_00406710
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00423F200_2_00423F20
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043F7200_2_0043F720
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0041E7C00_2_0041E7C0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004197C20_2_004197C2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0042DFE90_2_0042DFE9
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0040A7800_2_0040A780
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00411F900_2_00411F90
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004187920_2_00418792
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_004157990_2_00415799
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043EFB00_2_0043EFB0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0213F2170_2_0213F217
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0211D2300_2_0211D230
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0211EA270_2_0211EA27
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02119A290_2_02119A29
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0212E2500_2_0212E250
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02138A770_2_02138A77
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02108AB70_2_02108AB7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02121B070_2_02121B07
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02120BA00_2_02120BA0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02130BA70_2_02130BA7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02103BD70_2_02103BD7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021223F70_2_021223F7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02105BF70_2_02105BF7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021178060_2_02117806
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021380570_2_02138057
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021180550_2_02118055
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021260D70_2_021260D7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0211E0E70_2_0211E0E7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021269370_2_02126937
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0213B1270_2_0213B127
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021289270_2_02128927
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021061470_2_02106147
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021069770_2_02106977
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021231660_2_02123166
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0213F9870_2_0213F987
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021211B70_2_021211B7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021121F70_2_021121F7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0210A9E70_2_0210A9E7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0210DE400_2_0210DE40
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0211CE630_2_0211CE63
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0211DE670_2_0211DE67
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021256940_2_02125694
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021246870_2_02124687
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0211FEDC0_2_0211FEDC
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0212AEF70_2_0212AEF7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021116F60_2_021116F6
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0213EF070_2_0213EF07
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02116F350_2_02116F35
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021077570_2_02107757
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021227770_2_02122777
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0210CFAD0_2_0210CFAD
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021097E70_2_021097E7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021094170_2_02109417
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021294440_2_02129444
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0210EC770_2_0210EC77
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0212CCB00_2_0212CCB0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0212DCBC0_2_0212DCBC
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0211E4F70_2_0211E4F7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021064E70_2_021064E7
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0212351D0_2_0212351D
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0212CD370_2_0212CD37
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0211B5470_2_0211B547
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0212CD780_2_0212CD78
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0213F5970_2_0213F597
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021085970_2_02108597
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_021045870_2_02104587
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0212CD890_2_0212CD89
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: String function: 00408030 appears 42 times
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: String function: 00414400 appears 65 times
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: String function: 02108297 appears 69 times
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: String function: 02114667 appears 43 times
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 1688
      Source: BZuk2UI1RC.exe, 00000000.00000000.1440715341.000000000044B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesDefence: vs BZuk2UI1RC.exe
      Source: BZuk2UI1RC.exe, 00000000.00000003.1448869983.00000000005DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesDefence: vs BZuk2UI1RC.exe
      Source: BZuk2UI1RC.exeBinary or memory string: OriginalFilenamesDefence: vs BZuk2UI1RC.exe
      Source: BZuk2UI1RC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000002.1677960315.0000000000670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: BZuk2UI1RC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@11/2
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_006707A6 CreateToolhelp32Snapshot,Module32First,0_2_006707A6
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00430C70 CoCreateInstance,0_2_00430C70
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3184
      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c22b434f-155c-4151-8508-6622547d9daeJump to behavior
      Source: BZuk2UI1RC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: BZuk2UI1RC.exeVirustotal: Detection: 62%
      Source: BZuk2UI1RC.exeReversingLabs: Detection: 52%
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeFile read: C:\Users\user\Desktop\BZuk2UI1RC.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\BZuk2UI1RC.exe "C:\Users\user\Desktop\BZuk2UI1RC.exe"
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 1688
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: msvcr100.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeUnpacked PE file: 0.2.BZuk2UI1RC.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeUnpacked PE file: 0.2.BZuk2UI1RC.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043D810 push eax; mov dword ptr [esp], 707F7E0Dh0_2_0043D812
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00443469 push ebp; iretd 0_2_0044346C
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0044366E push 9F00CD97h; ret 0_2_004436B1
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043AE30 push eax; mov dword ptr [esp], 1D1E1F10h0_2_0043AE3E
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0067582A push ss; retf 0_2_0067589B
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_006758AD push ss; retf 0_2_0067589B
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_006714DC push 00000039h; ret 0_2_006715B3
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00673480 push ebp; ret 0_2_00673483
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0067156B push 00000039h; ret 0_2_006715B3
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00671545 push 00000039h; ret 0_2_006715B3
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0213DA77 push eax; mov dword ptr [esp], 707F7E0Dh0_2_0213DA79
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02123A79 push esp; iretd 0_2_02123A7C
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0213B097 push eax; mov dword ptr [esp], 1D1E1F10h0_2_0213B0A5
      Source: BZuk2UI1RC.exeStatic PE information: section name: .text entropy: 7.796668748418523
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exe TID: 2564Thread sleep time: -120000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exe TID: 4064Thread sleep time: -30000s >= -30000sJump to behavior
      Source: Amcache.hve.4.drBinary or memory string: VMware
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
      Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.4.drBinary or memory string: vmci.sys
      Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.4.drBinary or memory string: VMware20,1
      Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0043C1F0 LdrInitializeThunk,0_2_0043C1F0
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_00670083 push dword ptr fs:[00000030h]0_2_00670083
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_0210092B mov eax, dword ptr fs:[00000030h]0_2_0210092B
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeCode function: 0_2_02100D90 mov eax, dword ptr fs:[00000030h]0_2_02100D90

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: BZuk2UI1RC.exeString found in binary or memory: rapeflowwj.lat
      Source: BZuk2UI1RC.exeString found in binary or memory: crosshuaht.lat
      Source: BZuk2UI1RC.exeString found in binary or memory: sustainskelet.lat
      Source: BZuk2UI1RC.exeString found in binary or memory: aspecteirs.lat
      Source: BZuk2UI1RC.exeString found in binary or memory: energyaffai.lat
      Source: BZuk2UI1RC.exeString found in binary or memory: necklacebudi.lat
      Source: BZuk2UI1RC.exeString found in binary or memory: discokeyus.lat
      Source: BZuk2UI1RC.exeString found in binary or memory: grannyejh.lat
      Source: BZuk2UI1RC.exeString found in binary or memory: sweepyribs.lat
      Source: C:\Users\user\Desktop\BZuk2UI1RC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      PowerShell
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping11
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Process Injection
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop Protocol2
      Clipboard Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook4
      Obfuscated Files or Information
      NTDS2
      System Information Discovery
      Distributed Component Object ModelInput Capture114
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script22
      Software Packing
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      BZuk2UI1RC.exe62%VirustotalBrowse
      BZuk2UI1RC.exe53%ReversingLabsWin32.Trojan.CrypterX
      BZuk2UI1RC.exe100%AviraHEUR/AGEN.1306978
      BZuk2UI1RC.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      sustainskelet.lat0%URL Reputationsafe
      sustainskelet.lat0%URL Reputationsafe
      crosshuaht.lat0%URL Reputationsafe
      necklacebudi.lat0%URL Reputationsafe
      necklacebudi.lat0%URL Reputationsafe
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      steamcommunity.com
      23.55.153.106
      truefalse
        high
        lev-tolstoi.com
        172.67.157.254
        truefalse
          high
          sustainskelet.lat
          unknown
          unknowntrue
          • 0%, URL Reputation
          • 0%, URL Reputation
          unknown
          crosshuaht.lat
          unknown
          unknowntrue
          • 0%, URL Reputation
          unknown
          rapeflowwj.lat
          unknown
          unknownfalse
            high
            grannyejh.lat
            unknown
            unknownfalse
              high
              aspecteirs.lat
              unknown
              unknownfalse
                high
                sweepyribs.lat
                unknown
                unknownfalse
                  high
                  discokeyus.lat
                  unknown
                  unknownfalse
                    high
                    energyaffai.lat
                    unknown
                    unknownfalse
                      high
                      necklacebudi.lat
                      unknown
                      unknowntrue
                      • 0%, URL Reputation
                      • 0%, URL Reputation
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      aspecteirs.latfalse
                        high
                        sweepyribs.latfalse
                          high
                          sustainskelet.latfalse
                            high
                            rapeflowwj.latfalse
                              high
                              https://steamcommunity.com/profiles/76561199724331900false
                                high
                                energyaffai.latfalse
                                  high
                                  https://lev-tolstoi.com/apifalse
                                    high
                                    grannyejh.latfalse
                                      high
                                      necklacebudi.latfalse
                                        high
                                        crosshuaht.latfalse
                                          high
                                          NameSourceMaliciousAntivirus DetectionReputation
                                          https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://player.vimeo.comBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&ampBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://steamcommunity.com/?subsection=broadcastsBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://store.steampowered.com/subscriber_agreement/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.gstatic.cn/recaptcha/BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEEBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.valvesoftware.com/legal.htmBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=enBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.youtube.comBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://www.google.comBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20FeedbackBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://sweepyribs.lat/apiZBZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=englBZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englisBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbCBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://s.ytimg.com;BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://store.steampBZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://community.fastly.steamstatic.com/BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://steam.tv/BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://cdn.fastly.steamstatic.ckBZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=enBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://steamcommunity.com/pBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://lev-tolstoi.com/BZuk2UI1RC.exe, 00000000.00000003.1530326181.0000000000630000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://store.steampowered.com/privacy_agreement/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://steamcommunity.com:443/profiles/76561199724331900BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://store.steampowered.com/points/shop/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&aBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://sketchfab.comBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://lv.queniujq.cnBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://steamcommunity.com/profiles/76561199724331900/inventory/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://www.youtube.com/BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://store.steampowered.com/privacy_agreement/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=engBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&amBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://www.google.com/recaptcha/BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://checkout.steampowered.com/BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://store.steampowered.com/;BZuk2UI1RC.exe, 00000000.00000003.1522449689.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499375682.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://store.steampowered.com/about/BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://steamcommunity.com/my/wishlist/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://help.steampowered.com/en/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://steamcommunity.com/market/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://store.steampowered.com/news/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=eBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://sustainskelet.lat:443/apiD;BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              unknown
                                                                                                                                              http://store.steampowered.com/subscriber_agreement/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.orgBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  https://recaptcha.net/recaptcha/;BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://steamcommunity.com/discussions/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://store.steampowered.com/stats/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&amBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          https://medal.tvBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            https://broadcast.st.dl.eccdnx.comBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.pngBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                high
                                                                                                                                                                https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&aBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                  high
                                                                                                                                                                  https://store.steampowered.com/steam_refunds/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                    high
                                                                                                                                                                    https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&aBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                      high
                                                                                                                                                                      https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                        high
                                                                                                                                                                        https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                          high
                                                                                                                                                                          https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=eBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                            high
                                                                                                                                                                            https://steamcommunity.com/workshop/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                              high
                                                                                                                                                                              https://login.steampowered.com/BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                high
                                                                                                                                                                                https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbbBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                  high
                                                                                                                                                                                  https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_cBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                    high
                                                                                                                                                                                    https://store.steampowered.com/legal/BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677737719.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530128063.000000000059A000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                      high
                                                                                                                                                                                      https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=enBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                        high
                                                                                                                                                                                        https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=engBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                          high
                                                                                                                                                                                          https://api.steampowered.cSBZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                            unknown
                                                                                                                                                                                            https://crosshuaht.lat:443/apiBZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                              unknown
                                                                                                                                                                                              https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&aBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                high
                                                                                                                                                                                                https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=englBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                  high
                                                                                                                                                                                                  https://help.steampowered.coBZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    unknown
                                                                                                                                                                                                    https://lev-tolstoi.com:443/apiiD;BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                      unknown
                                                                                                                                                                                                      https://recaptcha.netBZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        high
                                                                                                                                                                                                        http://upx.sf.netAmcache.hve.4.drfalse
                                                                                                                                                                                                          high
                                                                                                                                                                                                          https://lev-tolstoi.com/LBZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                            unknown
                                                                                                                                                                                                            https://store.steampowered.com/BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                              high
                                                                                                                                                                                                              https://lev-tolstoi.com/IBZuk2UI1RC.exe, 00000000.00000003.1530326181.0000000000630000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                unknown
                                                                                                                                                                                                                https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.pngBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                  high
                                                                                                                                                                                                                  http://127.0.0.1:27060BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005D8000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005E5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005D8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                    high
                                                                                                                                                                                                                    https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpgBZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                      high
                                                                                                                                                                                                                      https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gifBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                        high
                                                                                                                                                                                                                        https://lev-tolstoi.com:443/apiBZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                          high
                                                                                                                                                                                                                          https://rapeflowwj.lat:443/apiBZuk2UI1RC.exe, 00000000.00000003.1494863173.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530519508.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522371048.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1499680932.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522234348.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1530370628.00000000005C5000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000002.1677808905.00000000005C8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                            unknown
                                                                                                                                                                                                                            https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQBZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000622000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1494519631.0000000000628000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522216768.000000000062E000.00000004.00000020.00020000.00000000.sdmp, BZuk2UI1RC.exe, 00000000.00000003.1522176884.000000000062E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                              high
                                                                                                                                                                                                                              • No. of IPs < 25%
                                                                                                                                                                                                                              • 25% < No. of IPs < 50%
                                                                                                                                                                                                                              • 50% < No. of IPs < 75%
                                                                                                                                                                                                                              • 75% < No. of IPs
                                                                                                                                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                                              172.67.157.254
                                                                                                                                                                                                                              lev-tolstoi.comUnited States
                                                                                                                                                                                                                              13335CLOUDFLARENETUSfalse
                                                                                                                                                                                                                              23.55.153.106
                                                                                                                                                                                                                              steamcommunity.comUnited States
                                                                                                                                                                                                                              20940AKAMAI-ASN1EUfalse
                                                                                                                                                                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                                                              Analysis ID:1579647
                                                                                                                                                                                                                              Start date and time:2024-12-23 07:00:15 +01:00
                                                                                                                                                                                                                              Joe Sandbox product:CloudBasic
                                                                                                                                                                                                                              Overall analysis duration:0h 5m 24s
                                                                                                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                                                                                                              Report type:full
                                                                                                                                                                                                                              Cookbook file name:default.jbs
                                                                                                                                                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                                              Number of analysed new started processes analysed:10
                                                                                                                                                                                                                              Number of new started drivers analysed:0
                                                                                                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                                                                                                              Number of injected processes analysed:0
                                                                                                                                                                                                                              Technologies:
                                                                                                                                                                                                                              • HCA enabled
                                                                                                                                                                                                                              • EGA enabled
                                                                                                                                                                                                                              • AMSI enabled
                                                                                                                                                                                                                              Analysis Mode:default
                                                                                                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                                                                                                              Sample name:BZuk2UI1RC.exe
                                                                                                                                                                                                                              renamed because original name is a hash value
                                                                                                                                                                                                                              Original Sample Name:44be52262ede26fde4f5ada4506d03cf.exe
                                                                                                                                                                                                                              Detection:MAL
                                                                                                                                                                                                                              Classification:mal100.troj.evad.winEXE@2/5@11/2
                                                                                                                                                                                                                              EGA Information:
                                                                                                                                                                                                                              • Successful, ratio: 100%
                                                                                                                                                                                                                              HCA Information:
                                                                                                                                                                                                                              • Successful, ratio: 92%
                                                                                                                                                                                                                              • Number of executed functions: 17
                                                                                                                                                                                                                              • Number of non-executed functions: 211
                                                                                                                                                                                                                              Cookbook Comments:
                                                                                                                                                                                                                              • Found application associated with file extension: .exe
                                                                                                                                                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                                                                                                                              • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.190.181.1, 52.149.20.212, 4.175.87.197, 13.107.246.63
                                                                                                                                                                                                                              • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                                                                                              TimeTypeDescription
                                                                                                                                                                                                                              01:01:13API Interceptor7x Sleep call for process: BZuk2UI1RC.exe modified
                                                                                                                                                                                                                              01:01:35API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                              172.67.157.254EI3TafelpV.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                6S7hoBEHvr.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                  Neverlose.cc.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                    Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                      Armanivenntii_crypted_EASY.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                        aqbjn3fl.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                          aqbjn3fl.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                            v_dolg.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                                              random.exe.6.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                alexshlu.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                                                  23.55.153.106uLkHEqZ3u3.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                    hAmnMk8afk.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                      EI3TafelpV.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                        6S7hoBEHvr.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                          uZO96rXyWt.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                            Neverlose.cc.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                              Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                  Launcher.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                    Wave-Executor.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                      lev-tolstoi.comuLkHEqZ3u3.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                                      • 104.21.66.86
                                                                                                                                                                                                                                                                      EI3TafelpV.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      6S7hoBEHvr.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      uZO96rXyWt.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 104.21.66.86
                                                                                                                                                                                                                                                                      Neverlose.cc.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 104.21.66.86
                                                                                                                                                                                                                                                                      Launcher.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 104.21.66.86
                                                                                                                                                                                                                                                                      8ZVMneG.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 104.21.66.86
                                                                                                                                                                                                                                                                      ji2xlo1f.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 104.21.66.86
                                                                                                                                                                                                                                                                      steamcommunity.comuLkHEqZ3u3.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      hAmnMk8afk.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      EI3TafelpV.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      6S7hoBEHvr.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      uZO96rXyWt.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Neverlose.cc.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Launcher.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Wave-Executor.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                      AKAMAI-ASN1EUuLkHEqZ3u3.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      gVKsiQIHqe.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                                                      • 23.44.201.28
                                                                                                                                                                                                                                                                      hAmnMk8afk.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      EI3TafelpV.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      6S7hoBEHvr.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      uZO96rXyWt.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      trZG6pItZj.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                                                      • 23.209.72.32
                                                                                                                                                                                                                                                                      Neverlose.cc.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      WonderHack.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      CLOUDFLARENETUSuLkHEqZ3u3.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                                      • 104.21.66.86
                                                                                                                                                                                                                                                                      gVKsiQIHqe.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                                                      • 172.64.41.3
                                                                                                                                                                                                                                                                      EI3TafelpV.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      6S7hoBEHvr.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      DHL AWB-documents.lnkGet hashmaliciousDivulge StealerBrowse
                                                                                                                                                                                                                                                                      • 162.159.138.232
                                                                                                                                                                                                                                                                      Rokadernes.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                                                                                                                                                                      • 104.21.86.72
                                                                                                                                                                                                                                                                      uZO96rXyWt.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 104.21.66.86
                                                                                                                                                                                                                                                                      trZG6pItZj.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                                                                                                                      • 172.64.41.3
                                                                                                                                                                                                                                                                      fKdiT1D1dk.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                                                                                                                                      • 104.16.249.249
                                                                                                                                                                                                                                                                      fKdiT1D1dk.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                                                                                                                                                                                                      • 104.16.248.249
                                                                                                                                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                      a0e9f5d64349fb13191bc781f81f42e1uLkHEqZ3u3.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, Stealc, VidarBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      hAmnMk8afk.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      EI3TafelpV.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      6S7hoBEHvr.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      uZO96rXyWt.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Echelon.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Neverlose.cc.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      bas.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Wine.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      Launcher_x64.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                                                                                                                                      • 172.67.157.254
                                                                                                                                                                                                                                                                      • 23.55.153.106
                                                                                                                                                                                                                                                                      No context
                                                                                                                                                                                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                      Size (bytes):65536
                                                                                                                                                                                                                                                                      Entropy (8bit):0.9752728558107332
                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                      SSDEEP:96:Gc4qFrvWnsthroD7JfMQXIDcQUc6+UtcEwcw3NmI+HbHg/wWGTf3hOyc45WAU6Nx:GhienT0qF6x8jsFmmzuiFkZ24IO8O
                                                                                                                                                                                                                                                                      MD5:E0D5220A887963856A2A88A5C4A9455C
                                                                                                                                                                                                                                                                      SHA1:485317CB8290903DEBA322B780328959B29B2045
                                                                                                                                                                                                                                                                      SHA-256:D94B0702A88DF746EC1159718426EC3421B0ADC4BF6706E39836C7D3F7D3DE06
                                                                                                                                                                                                                                                                      SHA-512:9B6EAAB517F09C7A138B4E75EB7F36B68561895CB5ED732C23E96C3666F5B5D9608170796D84503C3E7CC72503984187326FB001F9996F57EB5C01C94C22EF3C
                                                                                                                                                                                                                                                                      Malicious:true
                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.9.4.0.7.2.8.1.9.2.0.3.9.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.9.4.0.7.2.8.2.5.4.5.4.0.2.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.c.6.3.0.4.4.-.1.9.e.3.-.4.6.7.b.-.b.b.4.1.-.0.9.2.4.e.a.e.7.a.e.1.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.6.9.e.7.1.d.c.-.1.a.6.e.-.4.2.0.a.-.b.7.c.8.-.1.6.f.9.9.a.c.0.6.0.0.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.B.Z.u.k.2.U.I.1.R.C...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.7.0.-.0.0.0.1.-.0.0.1.4.-.c.5.d.0.-.b.d.1.1.0.0.5.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.0.5.f.b.8.d.0.7.2.4.1.7.3.7.0.c.0.9.f.c.3.e.8.2.7.8.1.5.0.5.a.0.0.0.0.f.f.f.f.!.0.0.0.0.7.a.d.5.a.8.2.9.d.b.8.5.9.3.b.5.d.0.7.4.a.4.3.c.2.a.8.b.4.7.8.2.c.b.1.b.e.5.5.b.!.B.Z.u.k.2.U.I.1.R.C...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                                                                                                                                                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      File Type:Mini DuMP crash report, 15 streams, Mon Dec 23 06:01:22 2024, 0x1205a4 type
                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                      Size (bytes):50538
                                                                                                                                                                                                                                                                      Entropy (8bit):2.6843960472006407
                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                      SSDEEP:192:8DXEHr8i0VjOp1BHzn9/y3Q2UjP2/o41QJXKj8qeXIePqlS2uWAXuGtuPG:f8iWa7BHz9/DX5hCs2AXZtUG
                                                                                                                                                                                                                                                                      MD5:8F16087A3EC17F529C096717B3D5F4C5
                                                                                                                                                                                                                                                                      SHA1:23E8925D9348957D5AD2AAEDE7052178358BB00E
                                                                                                                                                                                                                                                                      SHA-256:2DACABA4F3957978B562BE5CB6F057A70021F3163B69B1C9441D60B1ED82A0F0
                                                                                                                                                                                                                                                                      SHA-512:114A29ED5F1F6C4A390BACBC0027C86B2EAF91F59ECAB791117056379E39A3700EE684979433A127827F78F9FE5BCFD133CC14D375585E7C0AF21768CCCC1855
                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                      Preview:MDMP..a..... .........hg............4...............H.......................J...........`.......8...........T...........`A........................... ..............................................................................eJ......4!......GenuineIntel............T.......p.....hg.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                      Size (bytes):8354
                                                                                                                                                                                                                                                                      Entropy (8bit):3.6991624412339736
                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                      SSDEEP:192:R6l7wVeJ3o6b6YS2SU9vsZ5gmfh8+pDr89bzdsfxRm:R6lXJ46b6YjSU9w5gmfh8fzWfW
                                                                                                                                                                                                                                                                      MD5:CBD1A3D67576E85DF697B315E8CF748C
                                                                                                                                                                                                                                                                      SHA1:A1375B6A988AB544369E16E08C183C73C3C39B20
                                                                                                                                                                                                                                                                      SHA-256:F5919FC30A1319A6BC2FB8843C074D83E33D0F1CA974D5E2B5286F21146825AB
                                                                                                                                                                                                                                                                      SHA-512:1D3647A9C7FA83721C089C93EC7945393E6851827EC407ED764A2D0C39FBD08016613E179DDBB492A9BAB5B6D8BC68267F80FC723AF9A6749A9FD211EA2BE712
                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.8.4.<./.P.i.
                                                                                                                                                                                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                      Size (bytes):4623
                                                                                                                                                                                                                                                                      Entropy (8bit):4.503837362730135
                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                      SSDEEP:48:cvIwWl8zsnMJg77aI9eZWpW8VYCWlPYm8M4JpXbKAOqFs/o+q80TPPO31TB5zS5t:uIjfnKI7Yo7VWlSJRb9+1TrzqXd
                                                                                                                                                                                                                                                                      MD5:B75B6D83D5E5D5F2D4C231F7BA5917A2
                                                                                                                                                                                                                                                                      SHA1:21AD49A2B4DBBBADBD245759DD5EDAAF8CF8B7B9
                                                                                                                                                                                                                                                                      SHA-256:35FE002881100106AB9DECC3AAA32BFC0176025D376F0D90E4FFB1B7C603D84A
                                                                                                                                                                                                                                                                      SHA-512:9D10AF8AFFA135AC59ABBEFC3D69EE6B61A857263F06E0E2E1EFB31128A9537685D03F31760A3C113B28238FCDACED23650DB36F1B91AD32DEA70A52B3002CFE
                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="643504" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                                                                                                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      File Type:MS Windows registry file, NT/2000 or above
                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                      Size (bytes):1835008
                                                                                                                                                                                                                                                                      Entropy (8bit):4.372049968346012
                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                      SSDEEP:6144:hFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNNiL:HV1QyWWI/glMM6kF7Xq
                                                                                                                                                                                                                                                                      MD5:6957C57D9DEBE04B603979B9D29B8469
                                                                                                                                                                                                                                                                      SHA1:5CD9498E1D979D1AFA8BEFC7F9DD17D8719AD00A
                                                                                                                                                                                                                                                                      SHA-256:5BE55BCBFE529ACA31FFB1B36A6A03C28C90D74C7A74889F3A5C2A256EC3232B
                                                                                                                                                                                                                                                                      SHA-512:473DD7F212DEFB319B842C348412623A4B0145660BEE2CE883F1E162CE4C7E6CAE3093B3FE406312D7509381340BFD07FE18BFE711CF03609EB108EC825B8719
                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                      Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..c..U..............................................................................................................................................................................................................................................................................................................................................@.t#........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                                      Entropy (8bit):7.3786996785304035
                                                                                                                                                                                                                                                                      TrID:
                                                                                                                                                                                                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                                      File name:BZuk2UI1RC.exe
                                                                                                                                                                                                                                                                      File size:296'448 bytes
                                                                                                                                                                                                                                                                      MD5:44be52262ede26fde4f5ada4506d03cf
                                                                                                                                                                                                                                                                      SHA1:7ad5a829db8593b5d074a43c2a8b4782cb1be55b
                                                                                                                                                                                                                                                                      SHA256:bf11c3992f87146955b1ee149f07a75ab1bed65046704813b8e837c55e171486
                                                                                                                                                                                                                                                                      SHA512:04f6b79a4f3a10ae77f91e7e98b91d0516d5b148ba51bc08c23f6e594ed5a861fd95adcffe0d6cb0f8ffcc07a5cfbd4b88fae52e129a10f0858720a5305c3a20
                                                                                                                                                                                                                                                                      SSDEEP:6144:k+LtunhGQb8NrGPkWuDNInrEtLlSTVYKoW:dxIhjPED+rQLlFC
                                                                                                                                                                                                                                                                      TLSH:C754F122F690D471C58B51399424CBE47B3F78711666C88B73A41B3D2FF02C29B6B769
                                                                                                                                                                                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C...-,..-,..-,...,..-,...,..-,...,S.-,.)V,..-,..,,..-,...,..-,...,..-,...,..-,Rich..-,........................PE..L......d...
                                                                                                                                                                                                                                                                      Icon Hash:63796dc961636e0f
                                                                                                                                                                                                                                                                      Entrypoint:0x404886
                                                                                                                                                                                                                                                                      Entrypoint Section:.text
                                                                                                                                                                                                                                                                      Digitally signed:false
                                                                                                                                                                                                                                                                      Imagebase:0x400000
                                                                                                                                                                                                                                                                      Subsystem:windows gui
                                                                                                                                                                                                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                                                                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                                      Time Stamp:0x64C6D49B [Sun Jul 30 21:22:35 2023 UTC]
                                                                                                                                                                                                                                                                      TLS Callbacks:
                                                                                                                                                                                                                                                                      CLR (.Net) Version:
                                                                                                                                                                                                                                                                      OS Version Major:5
                                                                                                                                                                                                                                                                      OS Version Minor:0
                                                                                                                                                                                                                                                                      File Version Major:5
                                                                                                                                                                                                                                                                      File Version Minor:0
                                                                                                                                                                                                                                                                      Subsystem Version Major:5
                                                                                                                                                                                                                                                                      Subsystem Version Minor:0
                                                                                                                                                                                                                                                                      Import Hash:aa45dd407879e6b8355707382a3243fe
                                                                                                                                                                                                                                                                      Instruction
                                                                                                                                                                                                                                                                      call 00007FC66526D0AEh
                                                                                                                                                                                                                                                                      jmp 00007FC66526869Dh
                                                                                                                                                                                                                                                                      call 00007FC66526885Ch
                                                                                                                                                                                                                                                                      xchg cl, ch
                                                                                                                                                                                                                                                                      jmp 00007FC665268844h
                                                                                                                                                                                                                                                                      call 00007FC665268853h
                                                                                                                                                                                                                                                                      fxch st(0), st(1)
                                                                                                                                                                                                                                                                      jmp 00007FC66526883Bh
                                                                                                                                                                                                                                                                      fabs
                                                                                                                                                                                                                                                                      fld1
                                                                                                                                                                                                                                                                      mov ch, cl
                                                                                                                                                                                                                                                                      xor cl, cl
                                                                                                                                                                                                                                                                      jmp 00007FC665268831h
                                                                                                                                                                                                                                                                      mov byte ptr [ebp-00000090h], FFFFFFFEh
                                                                                                                                                                                                                                                                      fabs
                                                                                                                                                                                                                                                                      fxch st(0), st(1)
                                                                                                                                                                                                                                                                      fabs
                                                                                                                                                                                                                                                                      fxch st(0), st(1)
                                                                                                                                                                                                                                                                      fpatan
                                                                                                                                                                                                                                                                      or cl, cl
                                                                                                                                                                                                                                                                      je 00007FC665268826h
                                                                                                                                                                                                                                                                      fldpi
                                                                                                                                                                                                                                                                      fsubrp st(1), st(0)
                                                                                                                                                                                                                                                                      or ch, ch
                                                                                                                                                                                                                                                                      je 00007FC665268824h
                                                                                                                                                                                                                                                                      fchs
                                                                                                                                                                                                                                                                      ret
                                                                                                                                                                                                                                                                      fabs
                                                                                                                                                                                                                                                                      fld st(0), st(0)
                                                                                                                                                                                                                                                                      fld st(0), st(0)
                                                                                                                                                                                                                                                                      fld1
                                                                                                                                                                                                                                                                      fsubrp st(1), st(0)
                                                                                                                                                                                                                                                                      fxch st(0), st(1)
                                                                                                                                                                                                                                                                      fld1
                                                                                                                                                                                                                                                                      faddp st(1), st(0)
                                                                                                                                                                                                                                                                      fmulp st(1), st(0)
                                                                                                                                                                                                                                                                      ftst
                                                                                                                                                                                                                                                                      wait
                                                                                                                                                                                                                                                                      fstsw word ptr [ebp-000000A0h]
                                                                                                                                                                                                                                                                      wait
                                                                                                                                                                                                                                                                      test byte ptr [ebp-0000009Fh], 00000001h
                                                                                                                                                                                                                                                                      jne 00007FC665268827h
                                                                                                                                                                                                                                                                      xor ch, ch
                                                                                                                                                                                                                                                                      fsqrt
                                                                                                                                                                                                                                                                      ret
                                                                                                                                                                                                                                                                      pop eax
                                                                                                                                                                                                                                                                      jmp 00007FC66526D27Fh
                                                                                                                                                                                                                                                                      fstp st(0)
                                                                                                                                                                                                                                                                      fld tbyte ptr [00440BDAh]
                                                                                                                                                                                                                                                                      ret
                                                                                                                                                                                                                                                                      fstp st(0)
                                                                                                                                                                                                                                                                      or cl, cl
                                                                                                                                                                                                                                                                      je 00007FC66526882Dh
                                                                                                                                                                                                                                                                      fstp st(0)
                                                                                                                                                                                                                                                                      fldpi
                                                                                                                                                                                                                                                                      or ch, ch
                                                                                                                                                                                                                                                                      je 00007FC665268824h
                                                                                                                                                                                                                                                                      fchs
                                                                                                                                                                                                                                                                      ret
                                                                                                                                                                                                                                                                      fstp st(0)
                                                                                                                                                                                                                                                                      fldz
                                                                                                                                                                                                                                                                      or ch, ch
                                                                                                                                                                                                                                                                      je 00007FC665268819h
                                                                                                                                                                                                                                                                      fchs
                                                                                                                                                                                                                                                                      ret
                                                                                                                                                                                                                                                                      fstp st(0)
                                                                                                                                                                                                                                                                      jmp 00007FC66526D255h
                                                                                                                                                                                                                                                                      fstp st(0)
                                                                                                                                                                                                                                                                      mov cl, ch
                                                                                                                                                                                                                                                                      jmp 00007FC665268822h
                                                                                                                                                                                                                                                                      call 00007FC6652687EEh
                                                                                                                                                                                                                                                                      jmp 00007FC66526D260h
                                                                                                                                                                                                                                                                      int3
                                                                                                                                                                                                                                                                      int3
                                                                                                                                                                                                                                                                      int3
                                                                                                                                                                                                                                                                      int3
                                                                                                                                                                                                                                                                      int3
                                                                                                                                                                                                                                                                      int3
                                                                                                                                                                                                                                                                      int3
                                                                                                                                                                                                                                                                      int3
                                                                                                                                                                                                                                                                      push ebp
                                                                                                                                                                                                                                                                      mov ebp, esp
                                                                                                                                                                                                                                                                      add esp, FFFFFD30h
                                                                                                                                                                                                                                                                      push ebx
                                                                                                                                                                                                                                                                      wait
                                                                                                                                                                                                                                                                      fstcw word ptr [ebp+0000005Ch]
                                                                                                                                                                                                                                                                      Programming Language:
                                                                                                                                                                                                                                                                      • [C++] VS2008 build 21022
                                                                                                                                                                                                                                                                      • [ASM] VS2008 build 21022
                                                                                                                                                                                                                                                                      • [ C ] VS2008 build 21022
                                                                                                                                                                                                                                                                      • [IMP] VS2005 build 50727
                                                                                                                                                                                                                                                                      • [RES] VS2008 build 21022
                                                                                                                                                                                                                                                                      • [LNK] VS2008 build 21022
                                                                                                                                                                                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3edc00x28.text
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x4b0000x39d0.rsrc
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2e680x40.text
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x18c.text
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                                      .text0x10000x3e6c80x3e800072cb0c1599478a0d49a4aba7a044657False0.87226171875data7.796668748418523IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                      .data0x400000xabe80x6000317d3fed444a5fc230b2d2ca5ad7bf32False0.08186848958333333data0.9751599142580942IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                                      .rsrc0x4b0000xa9d00x3a002320f00814b0e4c6f824d27e3da334a3False0.44679418103448276data3.943978022106766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                                      RT_ICON0x4b1e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5362903225806451
                                                                                                                                                                                                                                                                      RT_ICON0x4b1e00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5362903225806451
                                                                                                                                                                                                                                                                      RT_ICON0x4b8a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.4114107883817427
                                                                                                                                                                                                                                                                      RT_ICON0x4b8a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.4114107883817427
                                                                                                                                                                                                                                                                      RT_ICON0x4de500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4512411347517731
                                                                                                                                                                                                                                                                      RT_ICON0x4de500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4512411347517731
                                                                                                                                                                                                                                                                      RT_STRING0x4e5380x496dataTamilIndia0.444633730834753
                                                                                                                                                                                                                                                                      RT_STRING0x4e5380x496dataTamilSri Lanka0.444633730834753
                                                                                                                                                                                                                                                                      RT_ACCELERATOR0x4e2e80x50dataTamilIndia0.825
                                                                                                                                                                                                                                                                      RT_ACCELERATOR0x4e2e80x50dataTamilSri Lanka0.825
                                                                                                                                                                                                                                                                      RT_GROUP_ICON0x4e2b80x30dataTamilIndia0.9375
                                                                                                                                                                                                                                                                      RT_GROUP_ICON0x4e2b80x30dataTamilSri Lanka0.9375
                                                                                                                                                                                                                                                                      RT_VERSION0x4e3380x1fcdata0.5433070866141733
                                                                                                                                                                                                                                                                      DLLImport
                                                                                                                                                                                                                                                                      KERNEL32.dllWriteConsoleInputW, SetComputerNameExA, GetConsoleAliasExesLengthA, EnumCalendarInfoW, InterlockedDecrement, GetCurrentProcess, InterlockedCompareExchange, GetComputerNameW, GetModuleHandleW, EnumCalendarInfoExW, GetWindowsDirectoryA, EnumTimeFormatsW, CopyFileW, VerifyVersionInfoA, FindNextVolumeMountPointW, GetShortPathNameA, LCMapStringA, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, SetLastError, GetProcAddress, VirtualAlloc, GetAtomNameA, LoadLibraryA, CreateSemaphoreW, InterlockedExchangeAdd, GetCommMask, GlobalUnWire, FreeEnvironmentStringsW, EnumDateFormatsW, OpenEventW, SetCalendarInfoA, GetVersionExA, ReadConsoleInputW, TerminateJobObject, GetCurrentProcessId, FindNextVolumeA, SetFileAttributesW, MultiByteToWideChar, GetCommandLineA, GetStartupInfoA, GetCPInfo, InterlockedIncrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapAlloc, HeapFree, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, DeleteCriticalSection, SetFilePointer, CloseHandle, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, WideCharToMultiByte, GetEnvironmentStringsW, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapReAlloc, ReadFile, InitializeCriticalSectionAndSpinCount, RtlUnwind, RaiseException, SetStdHandle, GetConsoleCP, GetConsoleMode, FlushFileBuffers, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, HeapSize, CreateFileA
                                                                                                                                                                                                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                                      TamilIndia
                                                                                                                                                                                                                                                                      TamilSri Lanka
                                                                                                                                                                                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                                                                                      2024-12-23T07:01:14.444489+01002058378ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sweepyribs .lat)1192.168.2.8621741.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:14.590969+01002058364ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat)1192.168.2.8506701.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:14.869437+01002058360ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat)1192.168.2.8496111.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:15.010018+01002058370ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (necklacebudi .lat)1192.168.2.8499581.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:15.154639+01002058362ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (energyaffai .lat)1192.168.2.8581521.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:15.295172+01002058354ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (aspecteirs .lat)1192.168.2.8512511.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:15.437108+01002058376ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (sustainskelet .lat)1192.168.2.8508781.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:15.763025+01002058358ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crosshuaht .lat)1192.168.2.8546421.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:15.977070+01002058374ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (rapeflowwj .lat)1192.168.2.8502511.1.1.153UDP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:17.912347+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.84970423.55.153.106443TCP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:18.693447+01002858666ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup1192.168.2.84970423.55.153.106443TCP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:20.958942+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849705172.67.157.254443TCP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:21.721403+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.849705172.67.157.254443TCP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:21.721403+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.849705172.67.157.254443TCP
                                                                                                                                                                                                                                                                      2024-12-23T07:01:22.460389+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849706172.67.157.254443TCP
                                                                                                                                                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.514902115 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.514954090 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.515028954 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.519687891 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.519709110 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:17.912117958 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:17.912347078 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:17.917241096 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:17.917257071 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:17.917576075 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:17.967061043 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:17.986027956 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.031332016 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.693581104 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.693648100 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.693680048 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.693701982 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.693737984 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.693986893 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.694022894 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.694070101 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.861994982 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.862057924 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.862179041 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.862214088 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.862252951 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.900192976 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.900252104 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.900296926 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.900309086 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.900369883 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.935571909 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.935591936 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.935622931 CET49704443192.168.2.823.55.153.106
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:18.935628891 CET4434970423.55.153.106192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.741938114 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.742038965 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.742117882 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.742558956 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.742583036 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:20.958812952 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:20.958941936 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:20.962137938 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:20.962152004 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:20.962469101 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:20.963946104 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:20.963979006 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:20.964025974 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.721398115 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.721494913 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.721563101 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.722278118 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.722301960 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.722315073 CET49705443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.722321987 CET44349705172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.763340950 CET49706443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.763395071 CET44349706172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.763534069 CET49706443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.763844013 CET49706443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:21.763858080 CET44349706172.67.157.254192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:22.460388899 CET49706443192.168.2.8172.67.157.254
                                                                                                                                                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.444489002 CET6217453192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.585608006 CET53621741.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.590969086 CET5067053192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.814521074 CET53506701.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.869436979 CET4961153192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.008068085 CET53496111.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.010018110 CET4995853192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.152050972 CET53499581.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.154639006 CET5815253192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.291475058 CET53581521.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.295171976 CET5125153192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.432914019 CET53512511.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.437108040 CET5087853192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.664585114 CET53508781.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.763025045 CET5464253192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.901640892 CET53546421.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.977070093 CET5025153192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.116705894 CET53502511.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.367994070 CET5164353192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.505105972 CET53516431.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.495098114 CET5965953192.168.2.81.1.1.1
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.740900993 CET53596591.1.1.1192.168.2.8
                                                                                                                                                                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.444489002 CET192.168.2.81.1.1.10xa9ceStandard query (0)sweepyribs.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.590969086 CET192.168.2.81.1.1.10xed5cStandard query (0)grannyejh.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.869436979 CET192.168.2.81.1.1.10x1eb6Standard query (0)discokeyus.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.010018110 CET192.168.2.81.1.1.10xe9eeStandard query (0)necklacebudi.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.154639006 CET192.168.2.81.1.1.10xf32aStandard query (0)energyaffai.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.295171976 CET192.168.2.81.1.1.10x45d7Standard query (0)aspecteirs.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.437108040 CET192.168.2.81.1.1.10x3bd8Standard query (0)sustainskelet.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.763025045 CET192.168.2.81.1.1.10x6d72Standard query (0)crosshuaht.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.977070093 CET192.168.2.81.1.1.10x19d8Standard query (0)rapeflowwj.latA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.367994070 CET192.168.2.81.1.1.10x2725Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.495098114 CET192.168.2.81.1.1.10x887aStandard query (0)lev-tolstoi.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.585608006 CET1.1.1.1192.168.2.80xa9ceName error (3)sweepyribs.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:14.814521074 CET1.1.1.1192.168.2.80xed5cName error (3)grannyejh.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.008068085 CET1.1.1.1192.168.2.80x1eb6Name error (3)discokeyus.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.152050972 CET1.1.1.1192.168.2.80xe9eeName error (3)necklacebudi.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.291475058 CET1.1.1.1192.168.2.80xf32aName error (3)energyaffai.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.432914019 CET1.1.1.1192.168.2.80x45d7Name error (3)aspecteirs.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.664585114 CET1.1.1.1192.168.2.80x3bd8Name error (3)sustainskelet.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:15.901640892 CET1.1.1.1192.168.2.80x6d72Name error (3)crosshuaht.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.116705894 CET1.1.1.1192.168.2.80x19d8Name error (3)rapeflowwj.latnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:16.505105972 CET1.1.1.1192.168.2.80x2725No error (0)steamcommunity.com23.55.153.106A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.740900993 CET1.1.1.1192.168.2.80x887aNo error (0)lev-tolstoi.com172.67.157.254A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      Dec 23, 2024 07:01:19.740900993 CET1.1.1.1192.168.2.80x887aNo error (0)lev-tolstoi.com104.21.66.86A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                      • steamcommunity.com
                                                                                                                                                                                                                                                                      • lev-tolstoi.com
                                                                                                                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                      0192.168.2.84970423.55.153.1064433184C:\Users\user\Desktop\BZuk2UI1RC.exe
                                                                                                                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                      2024-12-23 06:01:17 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                                                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                                                      Host: steamcommunity.com
                                                                                                                                                                                                                                                                      2024-12-23 06:01:18 UTC1905INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                                                                                      Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.fastly.steamstatic.com/ https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.fastly.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                                                                                                                                                                                                      Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                      Date: Mon, 23 Dec 2024 06:01:18 GMT
                                                                                                                                                                                                                                                                      Content-Length: 35121
                                                                                                                                                                                                                                                                      Connection: close
                                                                                                                                                                                                                                                                      Set-Cookie: sessionid=014b802d766e738a21f540cf; Path=/; Secure; SameSite=None
                                                                                                                                                                                                                                                                      Set-Cookie: steamCountry=US%7C185ce35c568ebbb18a145d0cabae7186; Path=/; Secure; HttpOnly; SameSite=None
                                                                                                                                                                                                                                                                      2024-12-23 06:01:18 UTC14479INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0a 09 09 3c 74 69 74 6c 65 3e
                                                                                                                                                                                                                                                                      Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><title>
                                                                                                                                                                                                                                                                      2024-12-23 06:01:18 UTC10097INData Raw: 2e 63 6f 6d 2f 3f 73 75 62 73 65 63 74 69 6f 6e 3d 62 72 6f 61 64 63 61 73 74 73 22 3e 0a 09 09 09 09 09 09 42 72 6f 61 64 63 61 73 74 73 09 09 09 09 09 09 09 09 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 74 6f 72 65 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 61 62 6f 75 74 2f 22 3e 0a 09 09 09 09 41 62 6f 75 74 09 09 09 3c 2f 61 3e 0a 09 09 09 09 09 09 09 09 09 09 3c 61 20 63 6c 61 73 73 3d 22 6d 65 6e 75 69 74 65 6d 20 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 68 65 6c 70 2e 73 74 65 61 6d 70 6f 77 65 72 65 64 2e 63 6f 6d 2f 65 6e 2f 22 3e 0a 09 09 09 09 53 55 50 50 4f 52 54 09
                                                                                                                                                                                                                                                                      Data Ascii: .com/?subsection=broadcasts">Broadcasts</a></div><a class="menuitem " href="https://store.steampowered.com/about/">About</a><a class="menuitem " href="https://help.steampowered.com/en/">SUPPORT
                                                                                                                                                                                                                                                                      2024-12-23 06:01:18 UTC10545INData Raw: 4e 49 56 45 52 53 45 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 70 75 62 6c 69 63 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4c 41 4e 47 55 41 47 45 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 65 6e 67 6c 69 73 68 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 43 4f 55 4e 54 52 59 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 55 53 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4d 45 44 49 41 5f 43 44 4e 5f 43 4f 4d 4d 55 4e 49 54 59 5f 55 52 4c 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 68 74 74 70 73 3a 5c 2f 5c 2f 63 64 6e 2e 66 61 73 74 6c 79 2e 73 74 65 61 6d 73 74 61 74 69 63 2e 63 6f 6d 5c 2f 73 74 65 61 6d 63 6f 6d 6d 75 6e 69 74 79 5c 2f 70 75 62 6c 69 63 5c 2f 26 71 75 6f 74 3b 2c 26 71 75 6f 74 3b 4d 45 44 49 41 5f 43 44 4e 5f 55 52 4c 26 71 75 6f 74 3b 3a 26 71 75 6f 74 3b 68 74 74
                                                                                                                                                                                                                                                                      Data Ascii: NIVERSE&quot;:&quot;public&quot;,&quot;LANGUAGE&quot;:&quot;english&quot;,&quot;COUNTRY&quot;:&quot;US&quot;,&quot;MEDIA_CDN_COMMUNITY_URL&quot;:&quot;https:\/\/cdn.fastly.steamstatic.com\/steamcommunity\/public\/&quot;,&quot;MEDIA_CDN_URL&quot;:&quot;htt


                                                                                                                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                      1192.168.2.849705172.67.157.2544433184C:\Users\user\Desktop\BZuk2UI1RC.exe
                                                                                                                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                      2024-12-23 06:01:20 UTC262OUTPOST /api HTTP/1.1
                                                                                                                                                                                                                                                                      Connection: Keep-Alive
                                                                                                                                                                                                                                                                      Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                      Host: lev-tolstoi.com
                                                                                                                                                                                                                                                                      2024-12-23 06:01:20 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                                                                                                                      Data Ascii: act=life
                                                                                                                                                                                                                                                                      2024-12-23 06:01:21 UTC1125INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                      Date: Mon, 23 Dec 2024 06:01:21 GMT
                                                                                                                                                                                                                                                                      Content-Type: text/html; charset=UTF-8
                                                                                                                                                                                                                                                                      Transfer-Encoding: chunked
                                                                                                                                                                                                                                                                      Connection: close
                                                                                                                                                                                                                                                                      Set-Cookie: PHPSESSID=h57iohcjp95tmtkvallfcof1js; expires=Thu, 17 Apr 2025 23:48:00 GMT; Max-Age=9999999; path=/
                                                                                                                                                                                                                                                                      Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                                                                                                                      Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                      X-Frame-Options: DENY
                                                                                                                                                                                                                                                                      X-Content-Type-Options: nosniff
                                                                                                                                                                                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                                                                                                                                                                                      cf-cache-status: DYNAMIC
                                                                                                                                                                                                                                                                      vary: accept-encoding
                                                                                                                                                                                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y6XGs4JNE5FTWdvP7XgftsTQLleH9N5BEgf9Zf0%2Bk%2FOFDxtKp%2BVvdYcgbaYJqUj04Ov5n%2BgeCITDoWxeb8zd3cLntd8rfGZSnMs0W886VVAqklDTl2VzkIiHgdPzEaK8Y7s%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                                                                                                                      Server: cloudflare
                                                                                                                                                                                                                                                                      CF-RAY: 8f6622f3b8a841d8-EWR
                                                                                                                                                                                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                                                                                                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1619&min_rtt=1614&rtt_var=616&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2834&recv_bytes=906&delivery_rate=1762220&cwnd=218&unsent_bytes=0&cid=92c65abc0b268280&ts=773&x=0"
                                                                                                                                                                                                                                                                      2024-12-23 06:01:21 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                                                                                                                                                                                      Data Ascii: 2ok
                                                                                                                                                                                                                                                                      2024-12-23 06:01:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                                                                                                                      Data Ascii: 0


                                                                                                                                                                                                                                                                      Click to jump to process

                                                                                                                                                                                                                                                                      Click to jump to process

                                                                                                                                                                                                                                                                      Click to dive into process behavior distribution

                                                                                                                                                                                                                                                                      Click to jump to process

                                                                                                                                                                                                                                                                      Target ID:0
                                                                                                                                                                                                                                                                      Start time:01:01:12
                                                                                                                                                                                                                                                                      Start date:23/12/2024
                                                                                                                                                                                                                                                                      Path:C:\Users\user\Desktop\BZuk2UI1RC.exe
                                                                                                                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                                                                                                                      Commandline:"C:\Users\user\Desktop\BZuk2UI1RC.exe"
                                                                                                                                                                                                                                                                      Imagebase:0x400000
                                                                                                                                                                                                                                                                      File size:296'448 bytes
                                                                                                                                                                                                                                                                      MD5 hash:44BE52262EDE26FDE4F5ADA4506D03CF
                                                                                                                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                      Yara matches:
                                                                                                                                                                                                                                                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                                                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1677960315.0000000000670000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                      Has exited:true

                                                                                                                                                                                                                                                                      Target ID:4
                                                                                                                                                                                                                                                                      Start time:01:01:21
                                                                                                                                                                                                                                                                      Start date:23/12/2024
                                                                                                                                                                                                                                                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                                                                                                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 1688
                                                                                                                                                                                                                                                                      Imagebase:0xcb0000
                                                                                                                                                                                                                                                                      File size:483'680 bytes
                                                                                                                                                                                                                                                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                      Reputation:high
                                                                                                                                                                                                                                                                      Has exited:true

                                                                                                                                                                                                                                                                      Reset < >

                                                                                                                                                                                                                                                                        Execution Graph

                                                                                                                                                                                                                                                                        Execution Coverage:1.7%
                                                                                                                                                                                                                                                                        Dynamic/Decrypted Code Coverage:30.2%
                                                                                                                                                                                                                                                                        Signature Coverage:32.3%
                                                                                                                                                                                                                                                                        Total number of Nodes:96
                                                                                                                                                                                                                                                                        Total number of Limit Nodes:9
                                                                                                                                                                                                                                                                        execution_graph 24524 405820 24526 40582e 24524->24526 24525 4058ab 24526->24525 24527 40587d GetModuleHandleW 24526->24527 24527->24525 24527->24526 24533 40c583 CoInitializeSecurity 24534 43c767 24536 43c790 24534->24536 24535 43c80e 24536->24535 24538 43c1f0 LdrInitializeThunk 24536->24538 24538->24535 24539 43cce6 24540 43cd00 24539->24540 24540->24540 24541 43cd6e 24540->24541 24546 43c1f0 LdrInitializeThunk 24540->24546 24545 43c1f0 LdrInitializeThunk 24541->24545 24544 43ce4d 24545->24544 24546->24541 24547 670000 24550 670006 24547->24550 24551 670015 24550->24551 24554 6707a6 24551->24554 24555 6707c1 24554->24555 24556 6707ca CreateToolhelp32Snapshot 24555->24556 24557 6707e6 Module32First 24555->24557 24556->24555 24556->24557 24558 6707f5 24557->24558 24560 670005 24557->24560 24561 670465 24558->24561 24562 670490 24561->24562 24563 6704a1 VirtualAlloc 24562->24563 24564 6704d9 24562->24564 24563->24564 24564->24564 24565 43c58a 24567 43c460 24565->24567 24566 43c5f4 24567->24566 24570 43c1f0 LdrInitializeThunk 24567->24570 24569 43c54d 24570->24569 24571 43c2c8 24572 43c2e0 GetForegroundWindow 24571->24572 24574 43ccbe 24572->24574 24575 210003c 24576 2100049 24575->24576 24590 2100e0f SetErrorMode SetErrorMode 24576->24590 24581 2100265 24582 21002ce VirtualProtect 24581->24582 24584 210030b 24582->24584 24583 2100439 VirtualFree 24588 21005f4 LoadLibraryA 24583->24588 24589 21004be 24583->24589 24584->24583 24585 21004e3 LoadLibraryA 24585->24589 24587 21008c7 24588->24587 24589->24585 24589->24588 24591 2100223 24590->24591 24592 2100d90 24591->24592 24593 2100dad 24592->24593 24594 2100dbb GetPEB 24593->24594 24595 2100238 VirtualAlloc 24593->24595 24594->24595 24595->24581 24596 408850 24598 40885f 24596->24598 24597 408acf ExitProcess 24598->24597 24599 40891c GetCurrentProcessId GetCurrentThreadId 24598->24599 24604 408ab3 24598->24604 24600 408941 24599->24600 24601 408945 SHGetSpecialFolderPathW GetForegroundWindow 24599->24601 24600->24601 24602 408a3d 24601->24602 24602->24604 24605 40c550 CoInitializeEx 24602->24605 24604->24597 24606 435972 24608 43599b 24606->24608 24609 4359c4 24608->24609 24610 43c1f0 LdrInitializeThunk 24608->24610 24610->24608 24611 43e7d0 24613 43e800 24611->24613 24612 43e94e 24615 43e87f 24613->24615 24617 43c1f0 LdrInitializeThunk 24613->24617 24615->24612 24618 43c1f0 LdrInitializeThunk 24615->24618 24617->24615 24618->24612 24624 40e71a CoUninitialize CoUninitialize 24625 40a03d 24626 40a130 24625->24626 24626->24626 24629 40acf0 24626->24629 24628 40a17f 24630 40ad80 24629->24630 24632 40ada5 24630->24632 24633 43c180 24630->24633 24632->24628 24634 43c1d0 24633->24634 24635 43c1ba 24633->24635 24636 43c1d6 24633->24636 24637 43c198 24633->24637 24639 43c1a6 24633->24639 24644 43c1c0 24633->24644 24648 43aaa0 24634->24648 24645 43aa80 24635->24645 24638 43aaa0 RtlFreeHeap 24636->24638 24637->24634 24637->24636 24637->24639 24637->24644 24642 43c1df 24638->24642 24643 43c1ab RtlReAllocateHeap 24639->24643 24643->24644 24644->24630 24652 43d810 24645->24652 24647 43aa8a RtlAllocateHeap 24647->24644 24649 43aab3 24648->24649 24650 43aac4 24648->24650 24651 43aab8 RtlFreeHeap 24649->24651 24650->24636 24651->24650 24653 43d830 24652->24653 24653->24647 24653->24653

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 84 40acf0-40ad78 85 40ad80-40ad89 84->85 85->85 86 40ad8b-40ad9e 85->86 88 40b012-40b019 86->88 89 40ada5-40ada7 86->89 90 40b0e7-40b0f0 86->90 91 40b0f7-40b0fd 86->91 92 40adac-40afc7 86->92 93 40b09d-40b0b7 86->93 94 40b01e-40b096 call 407f00 86->94 95 40b0ff-40b10a 86->95 120 40b367-40b373 88->120 96 40b351-40b358 89->96 90->91 90->95 98 40b341-40b344 90->98 99 40b1c4-40b1d1 90->99 100 40b268-40b289 call 43dbf0 90->100 101 40b1eb-40b1fa 90->101 102 40b22b-40b235 90->102 103 40b330 90->103 104 40b212-40b224 90->104 105 40b332-40b335 90->105 106 40b295-40b2b4 90->106 107 40b2f5-40b31b 90->107 108 40b375 90->108 109 40b2d6-40b2df call 43c180 90->109 110 40b256-40b263 90->110 111 40b1d8-40b1df 90->111 112 40b359 90->112 113 40b33c 90->113 114 40b23c-40b254 call 43dbf0 90->114 115 40b37c 90->115 116 40b31d 90->116 117 40b0be-40b0e2 call 43dbf0 90->117 118 40b141-40b164 91->118 97 40afd0-40aff2 92->97 93->112 93->117 94->90 94->91 94->93 94->95 94->98 94->99 94->100 94->101 94->102 94->103 94->104 94->105 94->106 94->107 94->108 94->109 94->110 94->111 94->112 94->113 94->114 94->115 94->116 94->117 119 40b110-40b13a 95->119 97->97 124 40aff4-40afff 97->124 136 40b34b 98->136 99->100 99->108 99->111 99->112 99->115 99->117 100->106 135 40b201-40b20b 101->135 102->100 102->108 102->110 102->111 102->112 102->114 102->115 102->117 104->98 104->100 104->102 104->103 104->105 104->106 104->107 104->108 104->109 104->110 104->111 104->112 104->113 104->114 104->115 104->116 104->117 105->98 105->100 105->108 105->110 105->111 105->112 105->113 105->114 105->115 105->117 131 40b2bd-40b2cf 106->131 123 40b322-40b328 107->123 108->115 132 40b2e4-40b2ee 109->132 110->98 111->101 138 40b362-40b364 112->138 113->98 114->110 140 40b383 115->140 116->123 117->112 128 40b170-40b1a1 118->128 119->119 127 40b13c-40b13f 119->127 120->96 123->103 143 40b002-40b00b 124->143 127->118 128->128 133 40b1a3-40b1bd 128->133 131->98 131->100 131->103 131->105 131->107 131->108 131->109 131->110 131->111 131->112 131->113 131->114 131->115 131->116 131->117 132->98 132->100 132->103 132->105 132->107 132->108 132->110 132->111 132->112 132->113 132->114 132->115 132->116 132->117 133->98 133->99 133->100 133->101 133->102 133->103 133->104 133->105 133->106 133->107 133->108 133->109 133->110 133->111 133->112 133->113 133->114 133->115 133->116 133->117 135->98 135->100 135->102 135->103 135->104 135->105 135->106 135->107 135->108 135->109 135->110 135->111 135->112 135->113 135->114 135->115 135->116 135->117 136->96 138->120 140->140 143->88 143->90 143->91 143->93 143->94 143->95 143->98 143->99 143->100 143->101 143->102 143->103 143->104 143->105 143->106 143->107 143->108 143->109 143->110 143->111 143->112 143->113 143->114 143->115 143->116 143->117
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: &K M$&wXy$'sZu$/O_q$Jk"m$e7o9$h? !
                                                                                                                                                                                                                                                                        • API String ID: 0-2986092683
                                                                                                                                                                                                                                                                        • Opcode ID: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                                                                                                                                                                                                                                                        • Instruction ID: 590b8efa2b06f5e02b6b835ab0c7a13339e1eb4ce69d4453d365afcab8c45654
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 78924bc98445a2391149b9471296c65ab5c3f104a6a24834f995a4e0cdf96e1e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D80286B5200B01DFD324CF25D891B97BBF1FB49705F108A2CE5AA8BAA0D775A845CF85

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 149 408850-408861 call 43bc60 152 408867-40888f call 408020 149->152 153 408acf-408ad1 ExitProcess 149->153 156 408890-4088cb 152->156 157 408904-408916 call 4354e0 156->157 158 4088cd-408902 156->158 161 408ab8-408abf 157->161 162 40891c-40893f GetCurrentProcessId GetCurrentThreadId 157->162 158->156 165 408ac1-408ac7 call 408030 161->165 166 408aca call 43c160 161->166 163 408941-408943 162->163 164 408945-408a3b SHGetSpecialFolderPathW GetForegroundWindow 162->164 163->164 169 408a6b-408aac call 409b00 164->169 170 408a3d-408a69 164->170 165->166 166->153 169->161 174 408aae call 40c550 169->174 170->169 176 408ab3 call 40b390 174->176 176->161
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 0040891C
                                                                                                                                                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00408925
                                                                                                                                                                                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004089DB
                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32 ref: 00408A33
                                                                                                                                                                                                                                                                          • Part of subcall function 0040C550: CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                                                                                                                                                                                                                                                          • Part of subcall function 0040B390: FreeLibrary.KERNEL32(00408AB8), ref: 0040B396
                                                                                                                                                                                                                                                                          • Part of subcall function 0040B390: FreeLibrary.KERNEL32 ref: 0040B3B7
                                                                                                                                                                                                                                                                        • ExitProcess.KERNEL32 ref: 00408AD1
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 3072701918-0
                                                                                                                                                                                                                                                                        • Opcode ID: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                                                                                                                                                                                                                                                        • Instruction ID: 4e8ceca9db94e69365d2c2d7f1aefafb9de861df3649afd20bfce81a3928f3be
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 80d43e03976d674c32d86d2947b6f6748d05092d2929b392bf544b78baad5a14
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9351A9BBF102180BD71CAEAACD463A675878BC5710F1F813E5985EB7D6EDB88C0142C9

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 189 6707a6-6707bf 190 6707c1-6707c3 189->190 191 6707c5 190->191 192 6707ca-6707d6 CreateToolhelp32Snapshot 190->192 191->192 193 6707e6-6707f3 Module32First 192->193 194 6707d8-6707de 192->194 195 6707f5-6707f6 call 670465 193->195 196 6707fc-670804 193->196 194->193 199 6707e0-6707e4 194->199 200 6707fb 195->200 199->190 199->193 200->196
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 006707CE
                                                                                                                                                                                                                                                                        • Module32First.KERNEL32(00000000,00000224), ref: 006707EE
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677960315.0000000000670000.00000040.00001000.00020000.00000000.sdmp, Offset: 00670000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_670000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 3833638111-0
                                                                                                                                                                                                                                                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                                                                                                                                                                        • Instruction ID: c914249ef1fa260167d6f1e172f6c846214063db98012f9c55ea941353bef361
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3BF06231101711ABE7243AB5988DAAF77EDAF49765F108628E64A911C0DA70F8454A71

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 246 43c1f0-43c222 LdrInitializeThunk
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • LdrInitializeThunk.NTDLL(0043E31B,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043C21E
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-0
                                                                                                                                                                                                                                                                        • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                                                                                                                                                                        • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,+*)
                                                                                                                                                                                                                                                                        • API String ID: 0-3529585375
                                                                                                                                                                                                                                                                        • Opcode ID: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                                                                                                                                                                                                                                                        • Instruction ID: 95b520c28a51d7a8debe208fb8c6725e065a55489a7142fefcc330b3f2274472
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e7fb2fe7fc15d814734d125e3abc6185c50616f6403d63d9b463f0ac7ddf630e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7331A539B402119BEB18CF58CCD1BBEB7B2BB49301F249129D501B7390CB75AD018B58
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: o`
                                                                                                                                                                                                                                                                        • API String ID: 0-3993896143
                                                                                                                                                                                                                                                                        • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                                                                                                                                                                                                                        • Instruction ID: 0bdba0f6bf2b5cd18ae264ba298f37260da84434396a298b3053f459174327b1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9C11C270218340AFC310DF65DDC1B6BBFE2DBC2204F65983DE185A72A1C675E9499719

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 0 210003c-2100047 1 2100049 0->1 2 210004c-2100263 call 2100a3f call 2100e0f call 2100d90 VirtualAlloc 0->2 1->2 17 2100265-2100289 call 2100a69 2->17 18 210028b-2100292 2->18 22 21002ce-21003c2 VirtualProtect call 2100cce call 2100ce7 17->22 19 21002a1-21002b0 18->19 21 21002b2-21002cc 19->21 19->22 21->19 29 21003d1-21003e0 22->29 30 21003e2-2100437 call 2100ce7 29->30 31 2100439-21004b8 VirtualFree 29->31 30->29 33 21005f4-21005fe 31->33 34 21004be-21004cd 31->34 35 2100604-210060d 33->35 36 210077f-2100789 33->36 38 21004d3-21004dd 34->38 35->36 40 2100613-2100637 35->40 42 21007a6-21007b0 36->42 43 210078b-21007a3 36->43 38->33 39 21004e3-2100505 LoadLibraryA 38->39 44 2100517-2100520 39->44 45 2100507-2100515 39->45 48 210063e-2100648 40->48 46 21007b6-21007cb 42->46 47 210086e-21008be LoadLibraryA 42->47 43->42 49 2100526-2100547 44->49 45->49 50 21007d2-21007d5 46->50 56 21008c7-21008f9 47->56 48->36 51 210064e-210065a 48->51 54 210054d-2100550 49->54 52 2100824-2100833 50->52 53 21007d7-21007e0 50->53 51->36 55 2100660-210066a 51->55 64 2100839-210083c 52->64 59 21007e2 53->59 60 21007e4-2100822 53->60 61 21005e0-21005ef 54->61 62 2100556-210056b 54->62 63 210067a-2100689 55->63 57 2100902-210091d 56->57 58 21008fb-2100901 56->58 58->57 59->52 60->50 61->38 65 210056d 62->65 66 210056f-210057a 62->66 67 2100750-210077a 63->67 68 210068f-21006b2 63->68 64->47 69 210083e-2100847 64->69 65->61 71 210059b-21005bb 66->71 72 210057c-2100599 66->72 67->48 73 21006b4-21006ed 68->73 74 21006ef-21006fc 68->74 75 2100849 69->75 76 210084b-210086c 69->76 83 21005bd-21005db 71->83 72->83 73->74 77 210074b 74->77 78 21006fe-2100748 74->78 75->47 76->64 77->63 78->77 83->54
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0210024D
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: AllocVirtual
                                                                                                                                                                                                                                                                        • String ID: cess$kernel32.dll
                                                                                                                                                                                                                                                                        • API String ID: 4275171209-1230238691
                                                                                                                                                                                                                                                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                                                                                                                                                                        • Instruction ID: aad6ab16f8a28cd0eb1489dbc57eebdc88624be26de041bf3cadf3bec6a1f088
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F4525974A01229DFDB64CF58C984BACBBB1BF09304F1580E9E54DAB391DB70AA95CF14

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 202 2100e0f-2100e24 SetErrorMode * 2 203 2100e26 202->203 204 2100e2b-2100e2c 202->204 203->204
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • SetErrorMode.KERNELBASE(00000400,?,?,02100223,?,?), ref: 02100E19
                                                                                                                                                                                                                                                                        • SetErrorMode.KERNELBASE(00000000,?,?,02100223,?,?), ref: 02100E1E
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: ErrorMode
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2340568224-0
                                                                                                                                                                                                                                                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                                                                                                                                                                        • Instruction ID: d5591706dddec6dc70c020a45b27ca906bb1356f428d6b1f08c8c78c4e708908
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 05D0123114512877D7002A94DC09BCD7B1CDF09B66F108011FB0DE9080C7B0954046E5

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 205 40e71a-40e738 CoUninitialize * 2
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Uninitialize
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 3861434553-0
                                                                                                                                                                                                                                                                        • Opcode ID: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                                                                                                                                                                                                                                                        • Instruction ID: 47d587ad0eb400b5f6ee0cc7c77a8a39c50d7b10eba8d8677ba26603a35f3bb5
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bd4e50c2cf2632c146e6dc99e67d996af78d75fcb2eac0acec7d90a27868b704
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 10C04CFDA85141EFD384CF24EC5A4157725AB866873000535F913C2370CA6065818A0C

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 206 405820-405842 call 407f00 209 405844 206->209 210 405849-405860 call 4081b0 206->210 209->210 213 405862-40586b 210->213 214 4058be-4058c8 210->214 215 405870-405876 213->215 216 405878 215->216 217 40587d-405894 GetModuleHandleW 215->217 216->217 218 4058b2-4058bc 217->218 219 405896-4058a9 217->219 218->214 219->215 220 4058ab-4058b0 219->220 220->214
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • GetModuleHandleW.KERNELBASE(?,?,?,?,?), ref: 0040588C
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: HandleModule
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 4139908857-0
                                                                                                                                                                                                                                                                        • Opcode ID: 8e901ba5148c6702b44f9b1240ddfca146225c5bdd8954d9284c1da35c4757c9
                                                                                                                                                                                                                                                                        • Instruction ID: 0d4195d5b314b9770d9cf11d3492fcf3a6869b1acdfdec8dd933405877ed8f77
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8e901ba5148c6702b44f9b1240ddfca146225c5bdd8954d9284c1da35c4757c9
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 151126B2A082085BE331BA49CC40BE7B29CCB48344F05443AFD88D7390E2B9DC944BE9

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 221 43c2c8-43c2d6 222 43c2e0-43c2fd 221->222 222->222 223 43c2ff-43ccb9 GetForegroundWindow call 43e110 222->223 226 43ccbe-43ccdf 223->226
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32 ref: 0043CCAF
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: ForegroundWindow
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2020703349-0
                                                                                                                                                                                                                                                                        • Opcode ID: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                                                                                                                                                                                                                                                        • Instruction ID: 8fb46afbfb550afb85baefcd5c24b2e1a72551ea741637eac68a3138d718cba2
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ee62edd4f90ceb3851fb76d6bb2596050db7060e58c86fce7ad8149e0838c105
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 07F04CBAD005408BDB044B75CC821A67BA2DB5F320B18897DD441E3384C63C5807CB5D

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 227 43c180-43c191 228 43c1d0-43c1d6 call 43aaa0 227->228 229 43c1a6-43c1b8 call 43d810 RtlReAllocateHeap 227->229 230 43c1c5 227->230 231 43c1cb 227->231 232 43c1ba-43c1bb call 43aa80 227->232 233 43c1d9-43c1df call 43aaa0 227->233 234 43c198-43c19f 227->234 228->233 238 43c1cd-43c1cf 229->238 230->231 231->238 242 43c1c0-43c1c3 232->242 234->228 234->229 234->230 234->231 234->233 242->238
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • RtlReAllocateHeap.NTDLL(?,00000000,?,00000000,?,?,0040B2E4,00000000,00000001), ref: 0043C1B2
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: AllocateHeap
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                        • Opcode ID: d479befdbac128fe149772a9185de956813756a2e3e272a70dac7c9e8d919251
                                                                                                                                                                                                                                                                        • Instruction ID: ec0cbf63999808cd9fde2cf832404b9ab0848eb4eaaead86bc709d6aa026588d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d479befdbac128fe149772a9185de956813756a2e3e272a70dac7c9e8d919251
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 59F0E977808211EBD2003F257C01A5736649F8F735F01587AFC0152112D739D422E6AF

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 244 40c550-40c580 CoInitializeEx
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040C563
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Initialize
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2538663250-0
                                                                                                                                                                                                                                                                        • Opcode ID: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                                                                                                                                                                                                                                                        • Instruction ID: e03bcfaf696d6c281ff3d22d3b8d0c31e3889364fa9117d67ae1079de8c3c82d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6fc60a274ed566bab613781af0777c43ce176e621231eb36fbaf2a6aedf8035e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 43D0A7B557050867D2086B1DDC4BF22772C8B83B66F50423DF2A7C61D1D9506A14CA79

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 245 40c583-40c5b2 CoInitializeSecurity
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040C595
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeSecurity
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 640775948-0
                                                                                                                                                                                                                                                                        • Opcode ID: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                                                                                                                                                                                                                                                        • Instruction ID: 58e2b5502705141ff0d3aa7c975cc0701997441b8ab7d7d43dac110591522243
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 49e86824338073915e330635472e4cd66e95047cd3c20be69d528b314b786c07
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F1D0C9B47D83407AF5749B08AC17F143210A702F56F740228B363FE2E0C9E172018A0C

                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                        control_flow_graph 247 43aaa0-43aaac 248 43aab3-43aabe call 43d810 RtlFreeHeap 247->248 249 43aac4-43aac5 247->249 248->249
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • RtlFreeHeap.NTDLL(?,00000000,?,0043C1D6,?,0040B2E4,00000000,00000001), ref: 0043AABE
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: FreeHeap
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 3298025750-0
                                                                                                                                                                                                                                                                        • Opcode ID: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                                                                                                                                                                                                                                                        • Instruction ID: 16971ee2c2e030bf17817a0d81dc477e65560ccac1e7abaabcdfe7fdc6775186
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6bd8f6e4c03da58ea1ddb055db28ee6a0cd2fda4e2937b11b34eec233391d5a2
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B2D01231505522EBC6102F25FC06B863A58EF0E761F0748B1B4006B071C765ECA186D8
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • RtlAllocateHeap.NTDLL(?,00000000,?,?,0043C1C0), ref: 0043AA90
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: AllocateHeap
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                        • Opcode ID: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                                                                                                                                                                                                                                                        • Instruction ID: 72b53a506d10aa35cab301047588232e26feb19e762ad2a100d4e8a4b6eb39e1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 733e1922efac4f9a0d584a8944a64cd40278d35b25fcdbd161a554f2c268bb95
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D6C09231445220BBCA143B16FC09FCA3F68EF4D762F0244A6F514670B2CB61BCA2CAD8
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 006704B6
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677960315.0000000000670000.00000040.00001000.00020000.00000000.sdmp, Offset: 00670000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_670000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: AllocVirtual
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 4275171209-0
                                                                                                                                                                                                                                                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                                                                                                                                                                        • Instruction ID: b30fde63bbf3d3d2ff162c3ce83752f5309ea8bf76c6a12e3f43a29b818c2b15
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 40112B79A40208EFDB01DF98C985E98BBF5AF08350F09C094FA489B362D371EA50DF90
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: $!$($+$,$.$/$0$0$1$1$1$1$2$3$3$4$5$5$7$7$8$9$:$;$<$<$=$>$>$?$?$?$@$@$@$B$B$D$D$D$F$J$L$L$N$P$R$T$U$V$W$X$X$Y$Z$[$[$\$]$^$_$`$`$b$b$d$f$f$g$j$o$o$q$r$r$s$u$v$v$x${$|
                                                                                                                                                                                                                                                                        • API String ID: 0-561599860
                                                                                                                                                                                                                                                                        • Opcode ID: 10d440d78822d09e0470b5f34489f211c766880f4e3e3e7e2fe2868a43d71886
                                                                                                                                                                                                                                                                        • Instruction ID: f086b17abffa5a23de60675b3e35e143f4d24521fa3f36365588902221ef9ede
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 10d440d78822d09e0470b5f34489f211c766880f4e3e3e7e2fe2868a43d71886
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B013AC3150C7C08AD3359B38C4543DFBBE1ABD6314F188A6EE4E9873C2D6B989858B57
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: $!$($+$,$.$/$0$0$1$1$1$1$2$3$3$4$5$5$7$7$8$9$:$;$<$<$=$>$>$?$?$?$@$@$@$B$B$D$D$D$F$J$L$L$N$P$R$T$U$V$W$X$X$Y$Z$[$[$\$]$^$_$`$`$b$b$d$f$f$g$j$o$o$q$r$r$s$u$v$v$x${$|
                                                                                                                                                                                                                                                                        • API String ID: 0-561599860
                                                                                                                                                                                                                                                                        • Opcode ID: 5d0905d9e0f91c5c418c3ecbfefb3f90c6b7c7927ba12d209d8fa4479d815a2e
                                                                                                                                                                                                                                                                        • Instruction ID: c463e6e3e477ed6ab04bc1b9a3e4c08c8de53dfc3cdda1d04e41f25210a897c0
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5d0905d9e0f91c5c418c3ecbfefb3f90c6b7c7927ba12d209d8fa4479d815a2e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F2138A3150C7D18ED3399B3884583AFBBE2AB96324F098A6DD4E9873C2D7798445CB53
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: -$.$0$1$4$5$:$=$@$B$D$F$G$H$J$L$N$N$P$R$T$V$X$Z$\$\$^$i$p$q$x$z${$|$~
                                                                                                                                                                                                                                                                        • API String ID: 0-168325148
                                                                                                                                                                                                                                                                        • Opcode ID: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                                                                                                                                                                                                                                                        • Instruction ID: 6b3287e7d647f6fc9aa8d330ed56109632cb450684d46cb972cc03f30992e160
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dffcdbe7c59816050bcb47420a350e77fe25c9c65786c839b5995c95da9d8176
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 15D19F2090C7D98EDB22C77C884439EBFA15B67324F1882DDD4E96B3D2C3B94946C766
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: !$*W.Y$+K!M$;[0]$>C7E$FOEH$NO$U'g)$UGBY$bweM$g#X%$l+X-$w?n!${7y9$$&$EG
                                                                                                                                                                                                                                                                        • API String ID: 0-3492884535
                                                                                                                                                                                                                                                                        • Opcode ID: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                                                                                                                                                                                                                                                        • Instruction ID: ba39798a3fcb6da663dd5afd8d89a9a5fc3f4f782173f0556435d4ff5b4d5338
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5e16a26193487a4bdaa5a93cbbb181080dd0d43d457804532e7adee19b2f1ec1
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A3E10EB4608350CFD7249F25E85176FBBF2FB86304F45896DE5D88B252D7388906CB4A
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • CoCreateInstance.OLE32(0044168C,00000000,00000001,0044167C,00000000), ref: 00438034
                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 004380C3
                                                                                                                                                                                                                                                                        • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00438101
                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 0043817E
                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 00438238
                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(C7C6C5CC), ref: 004382A8
                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 004383F9
                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32(?), ref: 0043841D
                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32(?), ref: 00438423
                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32(00000000), ref: 00438430
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: String$AllocFree$Variant$BlanketClearCreateInitInstanceProxy
                                                                                                                                                                                                                                                                        • String ID: P%R$)\"^$.H4J$O@$pq
                                                                                                                                                                                                                                                                        • API String ID: 2485776651-1397720406
                                                                                                                                                                                                                                                                        • Opcode ID: 99389cd6846ffddf47e3914131a3c94635c8c48cfc52d90ecef9ec7663b7e69d
                                                                                                                                                                                                                                                                        • Instruction ID: 8d1c6a9ba2bf63fa8fe487279597ba15b590cfaf954231a8494ef46f424a72d4
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 99389cd6846ffddf47e3914131a3c94635c8c48cfc52d90ecef9ec7663b7e69d
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D022EFB2A483418BD314CF25C880B5BBBE5EFC9704F148A2DF5919B381E779D909CB96
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK$tv
                                                                                                                                                                                                                                                                        • API String ID: 0-2608794092
                                                                                                                                                                                                                                                                        • Opcode ID: 21657e5fc834c3ca3d925c669eca665cb77afa54e23a7c0446644a9599fb4a76
                                                                                                                                                                                                                                                                        • Instruction ID: 95d7e76cba02f0a09582511e26c4ad00c8044fe5fc0ebc2eb1bbe37e4d815997
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 21657e5fc834c3ca3d925c669eca665cb77afa54e23a7c0446644a9599fb4a76
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3792C6B59053298BDB24CF59D8887EEBBB1FB85304F2082EDD4596B350DB744A86CF84
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: #f!x$$%$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                                                                                                                                                                                                                                                        • API String ID: 0-1300133108
                                                                                                                                                                                                                                                                        • Opcode ID: 58fd2d3b485852ad044d2fcd85ff715361975f915949706d7940c7d1c4703da1
                                                                                                                                                                                                                                                                        • Instruction ID: f0effb65835d2d2e0694896053be4e203788fa5b6255ab66f53faa1eae535f9a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 58fd2d3b485852ad044d2fcd85ff715361975f915949706d7940c7d1c4703da1
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: ED9294B5905229CBDB24CF59DC887EEBBB1FB85304F2082E9D4596B350DB744A86CF84
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$9YB$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$o#M%$pIrK
                                                                                                                                                                                                                                                                        • API String ID: 0-1893782281
                                                                                                                                                                                                                                                                        • Opcode ID: 352bc6129ea404ee1fcf6995b34e1b15834a7e93a19395cb87ac8d1b474b4daa
                                                                                                                                                                                                                                                                        • Instruction ID: 781679972a6841e1c847c4f60efe13a356bbdcba151b8db67255a8fcfea8ccb6
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 352bc6129ea404ee1fcf6995b34e1b15834a7e93a19395cb87ac8d1b474b4daa
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8E92A6B5905229CBDB24CF59D8887EEBB71FB85304F2082EDD4596B350DB744A86CF84
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: #f!x$%y$)Z*\$)Z/\$-^+P$5F6X$6T$7$8JL$:JL$<[5]$=_%A$>N@$?z=|$A/6Q$VaUc$hi$o#M%$pIrK
                                                                                                                                                                                                                                                                        • API String ID: 0-2118368390
                                                                                                                                                                                                                                                                        • Opcode ID: 6369199cb7596cff2474a1e92261283ffba6f3554d101fd91b4a7e503897d434
                                                                                                                                                                                                                                                                        • Instruction ID: ad83d1df18ddc81e899edf8cc22b4b8e4efa4d464215bc92938cceb4514a38c3
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6369199cb7596cff2474a1e92261283ffba6f3554d101fd91b4a7e503897d434
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FA32FCB484A3698ADBA5CF5599883CDBB70FB51304F2082D8C46D3B264DBB50BC6CF85
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • CoCreateInstance.COMBASE(0044168C,00000000,00000001,0044167C,00000000), ref: 0213829B
                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 0213832A
                                                                                                                                                                                                                                                                        • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 02138368
                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 021383E5
                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32()\"^), ref: 0213849F
                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(C7C6C5CC), ref: 0213850F
                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 02138660
                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32(00000000), ref: 02138697
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: String$Alloc$Variant$BlanketClearCreateFreeInitInstanceProxy
                                                                                                                                                                                                                                                                        • String ID: P%R$)\"^$.H4J$O@$pq
                                                                                                                                                                                                                                                                        • API String ID: 2775254435-1397720406
                                                                                                                                                                                                                                                                        • Opcode ID: 6b5d4364e48706977140092b86c3d080d2f37fa92fd1966bc9ba7ab4e9bc5c07
                                                                                                                                                                                                                                                                        • Instruction ID: 4d59554086f6647496c3ea537f24b84f467a05a981e88f37c9b580a4a0396d67
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6b5d4364e48706977140092b86c3d080d2f37fa92fd1966bc9ba7ab4e9bc5c07
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1A22DFB2A483408FD314DF24C880BABBBE6EFC5704F158A2CF5959B291D775D909CB92
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: !+2j$"$$01;$(7.A$908#$>7;<$O35 $bblg$gn~b$ne$vm/;$w!w4
                                                                                                                                                                                                                                                                        • API String ID: 0-1290103930
                                                                                                                                                                                                                                                                        • Opcode ID: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                                                                                                                                                                                                                                                        • Instruction ID: 9da03d0d7728415739df837e9a5d6b3acde744231e06f1a9769003f2125b84bf
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 50A1D37120C3D18BC316CF6984A076BBFE0AF97304F484A6DE4D55B382D339890ACB56
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: !+2j$"$$01;$(7.A$908#$>7;<$O35 $bblg$gn~b$ne$vm/;$w!w4
                                                                                                                                                                                                                                                                        • API String ID: 0-1290103930
                                                                                                                                                                                                                                                                        • Opcode ID: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                                                                                                                                                                                                                                                        • Instruction ID: 38a7c47c888495b0c5ed8df971465d6dbeb665e24a74ef16c32f991f5bb18fca
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e76aa1fc780e58e750d1ae106741ee0e38235b05f912ede24168565961e5c466
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 32A1F47124C3D18BC316CF6984A076BBFE1AFD7614F184AACE4D54B282D77A850ACB52
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: /G$I$7N1@$A[$Fg)i$OU$WE${\}
                                                                                                                                                                                                                                                                        • API String ID: 0-1763234448
                                                                                                                                                                                                                                                                        • Opcode ID: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                                                                                                                                                                                                                                                        • Instruction ID: 056ee81575811c50f3dd50ebd9ce003cf240713406730f881528123b83eb6744
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9a3fdac08369869b3e4b907af5614077a7e06872068b7e02554c3d5f210a0157
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2AF1CAB56083509FD3108F65E88276BBBF2FBD2345F54892DF0858B390D7B88906CB86
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 0u4w$KT$Q$SV$_q$p8`;$qr$xy
                                                                                                                                                                                                                                                                        • API String ID: 0-1826372655
                                                                                                                                                                                                                                                                        • Opcode ID: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                                                                                                                                                                                                                                                        • Instruction ID: 8fe2ea29b4499c84cffcf606e05d59b8c59937f8b413fb95e2f4cb334fca5623
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: de28215cb72b44d1e1dae71e7b93e978bf7f5bc1ac385d0b989c0c45dd6a48be
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C92212B690C3109BD304DF59D8816ABB7E2EFD5314F09892DE8C98B351E739C905CB8A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 8MNO$<I2K$NDNK$RXA$X$oA&C$~
                                                                                                                                                                                                                                                                        • API String ID: 0-3328159043
                                                                                                                                                                                                                                                                        • Opcode ID: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                                                                                                                                                                                                                                                        • Instruction ID: b39a018424f603aff0b8ca9a117b68807cb953dc34c5f22e55a732b949ac1150
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7d14a55b692df4f7a5a1489c3381dac725c5f5ca9d3437b0e32695eadac0db18
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 90F125B6608740CFC720CF29D8817EBB7E1AFD5314F194A2EE4D997251EB389845CB86
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 1]_$:;$}JsE$}JsE$AC$E)G$Q?S
                                                                                                                                                                                                                                                                        • API String ID: 0-2463461626
                                                                                                                                                                                                                                                                        • Opcode ID: 80c25fe3e2dfb50a6448c8159146231cdcc410b8e27bdf8e1fa965ce3e3910ee
                                                                                                                                                                                                                                                                        • Instruction ID: 1dd51b58cbaf6b0a0f55c15d87e18128fba8370b8dc8b23ccf2a832bc891c079
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 80c25fe3e2dfb50a6448c8159146231cdcc410b8e27bdf8e1fa965ce3e3910ee
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 29D1497665C3548BD324CF2488516ABBBE2EBC1304F1D897EE4D69B381D638C916CB87
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 1]_$:;$}JsE$}JsE$AC$E)G$Q?S
                                                                                                                                                                                                                                                                        • API String ID: 0-2463461626
                                                                                                                                                                                                                                                                        • Opcode ID: 682ddf53b01bc525795b072e2938ffae95751b7f3a8718d374d2731849975a8c
                                                                                                                                                                                                                                                                        • Instruction ID: 121d535a9da20bebfb4a5b2e3488dd4573fb75d6cb1620657744448532bf2a16
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 682ddf53b01bc525795b072e2938ffae95751b7f3a8718d374d2731849975a8c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1ED1297268C7544BC324CF2488916AFBBE2AFC1308F1D896DE5D58B385DB79C905CB42
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 1006321803-0
                                                                                                                                                                                                                                                                        • Opcode ID: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                                                                                                                                                                                                                                                        • Instruction ID: f2decc6a1db23371b8bb2cc1877cdad688787675f84f74fde2292b1bd35bf902
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 62f3a4270cdee086724bceffc210ad3ff0b6d52f738edb6c1f0dd5dd3d126aa6
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 855102F1D08A828FD700AF78C54936EFFA0AB15310F04863ED89597392D3BCA9598797
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                                                                                                                                                                                                                                                        • API String ID: 0-2309992716
                                                                                                                                                                                                                                                                        • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                                                                                                                                                                                                                        • Instruction ID: 26eceaee55227743b306782b87e7b3b011f3ad886b5b359efa5fd428808e0ec2
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F661F37164D3C68AD3118F3988A076BFFE09FA3310F18497EE4D05B382D7798A09975A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ($jqci$wkw6$x|j~$ye{|$z/6q$|$Nb
                                                                                                                                                                                                                                                                        • API String ID: 0-2309992716
                                                                                                                                                                                                                                                                        • Opcode ID: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                                                                                                                                                                                                                        • Instruction ID: d6ff0bd0dabeafae7118be50a024d3a2f1153e1f55ec63623f1bc06c76288037
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fd7fa187f6c051c069b61ec8393945a68ebd5901bcbcecc092057dec6910dd98
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9361047168D3C68AD3118F3988E076BFFE09F92614F18496DE4D18B3C2D3A9C6099B56
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: #4<7$+8=>$PK$Tiec$\$r
                                                                                                                                                                                                                                                                        • API String ID: 0-1906979145
                                                                                                                                                                                                                                                                        • Opcode ID: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                                                                                                                                                                                                                                                        • Instruction ID: 6053270823643479f5a9008bd7dab94ee1cb24749ea6a1c2bb59c6b2eb0b3cac
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8a87d060594a504fb9fb2c8fb36e58836b617313b2e0b34c62a439b04e6c237f
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 29D12476A087409BD318CF35C85166BBBE2EBD1318F18893DE5E69B391D738C905CB46
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: #4<7$+8=>$PK$Tiec$\$r
                                                                                                                                                                                                                                                                        • API String ID: 0-1906979145
                                                                                                                                                                                                                                                                        • Opcode ID: eb9bb64c8f79c1854ab48af47ab7cc54b735788ac4fdc3cb149e9e4095002922
                                                                                                                                                                                                                                                                        • Instruction ID: 29e44b2a8fb590baa3c77c70a5dc8e8da0d23e0fc47e3b2c115e4249a9889a0a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: eb9bb64c8f79c1854ab48af47ab7cc54b735788ac4fdc3cb149e9e4095002922
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 00D13576A4C3408FD318CF25C89166BBBE2EFC5718F18892DE4E68B291D778C905CB46
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 02108B83
                                                                                                                                                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 02108B8C
                                                                                                                                                                                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 02108C42
                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32 ref: 02108C9A
                                                                                                                                                                                                                                                                          • Part of subcall function 0210C7B7: CoInitializeEx.COMBASE(00000000,00000002), ref: 0210C7CA
                                                                                                                                                                                                                                                                          • Part of subcall function 0210B5F7: FreeLibrary.KERNEL32(02108D1F), ref: 0210B5FD
                                                                                                                                                                                                                                                                          • Part of subcall function 0210B5F7: FreeLibrary.KERNEL32 ref: 0210B61E
                                                                                                                                                                                                                                                                        • ExitProcess.KERNEL32 ref: 02108D38
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 3072701918-0
                                                                                                                                                                                                                                                                        • Opcode ID: a98a3e3c2a5f1b0f673359f816fa1806a79807cb3814a0bc3f2413038ab882b7
                                                                                                                                                                                                                                                                        • Instruction ID: 563c50ad00637f60a61736ceed13a0c3136fbe7215a8415912ef1f1a902d70c2
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a98a3e3c2a5f1b0f673359f816fa1806a79807cb3814a0bc3f2413038ab882b7
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5B5186B7F942180BD72CAFA9CC9A79975878BC9710F1F823D4945DB3D5EEB8880182C5
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: )G+I$+K M$B~B$|B$s0u
                                                                                                                                                                                                                                                                        • API String ID: 0-2670551875
                                                                                                                                                                                                                                                                        • Opcode ID: b0f283475cc496918f7695a9f64fd01b0ee276164c6e466a1bea6c055f4721cd
                                                                                                                                                                                                                                                                        • Instruction ID: a4cd9e1bca78e5d66c5ba9b7c65c08060f0057a840f0996e05fe944024406416
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b0f283475cc496918f7695a9f64fd01b0ee276164c6e466a1bea6c055f4721cd
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6C321175A08350CFD714CF28E85072EBBE2BF8A314F194A7DE89957392D7349805CB9A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: KT$Q$SV$p8`;$xy
                                                                                                                                                                                                                                                                        • API String ID: 0-2575762000
                                                                                                                                                                                                                                                                        • Opcode ID: 8208a9a5f85f4d31079f5f33de460df7d971af99579cab6366320c8ef0c9cde7
                                                                                                                                                                                                                                                                        • Instruction ID: 88f1f8c5165d4b23fa72e596150a34fc463e230c438df40e38fe06c686651f4c
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8208a9a5f85f4d31079f5f33de460df7d971af99579cab6366320c8ef0c9cde7
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B091FDB6A4C3549FD304DF66C84155FBBE2AFC5304F19896DE8C88B201EA358A09CBC6
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: "$-+$/$hI
                                                                                                                                                                                                                                                                        • API String ID: 0-2772680581
                                                                                                                                                                                                                                                                        • Opcode ID: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                                                                                                                                                                                                                                                        • Instruction ID: 80b5f3405da4d7e7bc2228bbbe7299cc3933a4313a4431d55bf3dd64750ae482
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 409baa93764c372ff58d36d41dba2cd8c3d99c0b7ed760c369768b2520c3b364
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6442387850C3818FC725CF25C8506AFBBE1AF85314F044A6EE8D85B392D739D94ACB5A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: "$-+$/$hI
                                                                                                                                                                                                                                                                        • API String ID: 0-2772680581
                                                                                                                                                                                                                                                                        • Opcode ID: baaf34aebe6e111159d882b3926c0eef9b01d4c2baae1dbce7045adb7806651d
                                                                                                                                                                                                                                                                        • Instruction ID: 1600a67d97b873881e2f1ed3ac5244f155fa6e8621c8e0f4a1bdab654a309713
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: baaf34aebe6e111159d882b3926c0eef9b01d4c2baae1dbce7045adb7806651d
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C042247454C3818FC725CF24C840A6EBFE2AF96314F188A7CE8E95B292D736C506CB56
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 0u4w$_q$qr$xy
                                                                                                                                                                                                                                                                        • API String ID: 0-1225007230
                                                                                                                                                                                                                                                                        • Opcode ID: 0bc8e236467d41b4c844bc6f0c0f01b646d1471f34f8a440b90695bf15ccba6a
                                                                                                                                                                                                                                                                        • Instruction ID: b83aadd71839d467116f8f221f5d8e743dc4d631284cda1a334e018c8f3ef947
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0bc8e236467d41b4c844bc6f0c0f01b646d1471f34f8a440b90695bf15ccba6a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AB9124B19483108BCB18CF58D89276BB3F1EF95324F18992CE8CA8B791E378D505C756
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                                                                                                                                                                                        • API String ID: 0-909542228
                                                                                                                                                                                                                                                                        • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                                                                                                                                                                                                                        • Instruction ID: f210d87f6d5865ed1c617f00c3be5d3d578c02e4f21426ae5baa12ce733d6edf
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C0919E71A1C3A08BE3358F3594517AFBBD2AFD3314F58896EC4C99B382C6794405CB96
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                                                                                                                                                                                        • API String ID: 0-909542228
                                                                                                                                                                                                                                                                        • Opcode ID: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                                                                                                                                                                                                                        • Instruction ID: b09798000825c57314bc53e6c9fcc3cbb1d7445649963d2458580d3476e3e87a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ad4b43c67400b0ccafcca15083408b2c8a4fed5129e88a914fecac855cc6ed9e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DB918A71A4C3A08BE325CB3984507ABBBD2AFD3314F29896DD5D99B382C7754409CB92
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                                                                                                                                                                                        • API String ID: 0-909542228
                                                                                                                                                                                                                                                                        • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                                                                                                                                                                                                                        • Instruction ID: ba8baf3debfb1281f5f3a9f4bb7f36b3e217b7d4f704efc08a24ef2861aa601e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FA916D71A1C3A08BE3358F3594917AFBBD2AFD3314F58896DC4C94B382CA794405CB96
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                                                                                                                                                                                        • API String ID: 0-909542228
                                                                                                                                                                                                                                                                        • Opcode ID: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                                                                                                                                                                                                                        • Instruction ID: d38bce736273aacf04592365ba5239e9b547478187a2a59d38ae575fa80d4a67
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f1c18572ebcde3c507da4d01c59951efa700b1a2472cb7546e8eacdba262d522
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5A917B71A4C3E08BE334CB3984517ABBBD29FD3214F29896DD5D99B381C7754409CB92
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                                                                                                                                                                                        • API String ID: 0-909542228
                                                                                                                                                                                                                                                                        • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                                                                                                                                                                                                                        • Instruction ID: f1dd0e060a49988aa5914a4bcfde423beaa814ce8563699fb3410ac54fff71cf
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 89918E71A1C3A08BE3358F3594517ABBFD2AFD3314F58896EC4C99B382C6794405CB96
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                                                                                                                                                                                        • API String ID: 0-909542228
                                                                                                                                                                                                                                                                        • Opcode ID: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                                                                                                                                                                                                                        • Instruction ID: 83f2bc6eecd3309d277bc023cf1f59a208a696fbbdf27eab1c76fc1833026bb9
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d2c01644c1b783dc07337eb5961086e4655b708d6c2de64b3f2482e035b941c1
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B9918B71A083E08FE334CB3984517ABBBD2AFD3314F29896DD5D99B682C7754409CB92
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                                                                                                                                                                                        • API String ID: 0-909542228
                                                                                                                                                                                                                                                                        • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                                                                                                                                                                                                                        • Instruction ID: 1e9c0ee7827ae846e03c62aab54aec301621c39cdfcdcbd3b33c3bf2ddd67d6a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4B814871A1C3A08BE3358F3994517ABBFD2AFE3314F59896DC4C94B386C6784409CB96
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,JHj$Hs$bc$v
                                                                                                                                                                                                                                                                        • API String ID: 0-909542228
                                                                                                                                                                                                                                                                        • Opcode ID: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                                                                                                                                                                                                                        • Instruction ID: 88dfddb63c9e1a9f9c150cb255111275abd9b31644755411bc43b18391fc3473
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3d500b1000b7ad2bbd92419dc8dce251e5a9dd8a0e3fad46196f1295967bd69e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4F8156719083E08FE334CF3988517ABBBD2AFE3204F29896DD4D94B682C7744409CB92
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: /G$I$7N1@$Fg)i${\}
                                                                                                                                                                                                                                                                        • API String ID: 0-149357369
                                                                                                                                                                                                                                                                        • Opcode ID: f8d948a9f8c2ec87f02193c7bcc93b1dfc54c6f05a1ef69b06e5b5d54ec4d898
                                                                                                                                                                                                                                                                        • Instruction ID: 258b4963f98e9e37cdb3aa6920649d7b20619bd36c21f77b1127b6acd3cc776f
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f8d948a9f8c2ec87f02193c7bcc93b1dfc54c6f05a1ef69b06e5b5d54ec4d898
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2521B8B55593909BC314CF66884161BFBE2BBD2704F29A92CF0C85B255D3748906CF8B
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID: ,$i$r}A
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-2114006112
                                                                                                                                                                                                                                                                        • Opcode ID: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                                                                                                                                                                                                                                                        • Instruction ID: 71abf614919c99122684cd8b50d12f0618c33dd175a6392faed4f31dbac36a6d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0e4b36d0337e01a9c7c8ce5630e9dd0ade0f1867cda4b4963c273f19514711e6
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 90427976A087508FD324CF69D8807ABBBE2EB96300F1D492ED4D5A7352C7389845C796
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: gfff$i$r}A
                                                                                                                                                                                                                                                                        • API String ID: 0-3931832132
                                                                                                                                                                                                                                                                        • Opcode ID: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                                                                                                                                                                                                                                                        • Instruction ID: 86030a502c6fbeff1aeb5632b982c99bae1c365f88ce42af9c09e5b1275022bd
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 63d4f06d283b13aa9aabc31ef275959d287b6dadcbde27f9351af1790c00577d
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 74028A76A483118BD724CF28D8817ABBBE2EBD2300F19852ED4C5D7392DB389945C786
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: <pr$st$y./
                                                                                                                                                                                                                                                                        • API String ID: 0-3839595785
                                                                                                                                                                                                                                                                        • Opcode ID: a785fe897820364b60474d4d38e44689b11c67a14769611824ea7061f52dc378
                                                                                                                                                                                                                                                                        • Instruction ID: 75883d3ccedddef3a45dabbf5554b36173ac4c5341f315a2b5b284ed2e941cbb
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a785fe897820364b60474d4d38e44689b11c67a14769611824ea7061f52dc378
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A6C16872B083206BD7149B25D95263BB3E1EFD4314F59852EE88697381E6BCD805C39A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: <pr$st$y./
                                                                                                                                                                                                                                                                        • API String ID: 0-3839595785
                                                                                                                                                                                                                                                                        • Opcode ID: 9e143f35872cbb7a2f64fee134240a1c59abbcbee3e9395d2d3f1030c864cd5b
                                                                                                                                                                                                                                                                        • Instruction ID: 1c4d0e42c7a8c0fa5eccafc9b95ab9961e4f226cfd4843956cd4b8680b91cccc
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9e143f35872cbb7a2f64fee134240a1c59abbcbee3e9395d2d3f1030c864cd5b
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B5C14872A483218BD7289F24C85276BB3E2EFC5314F19852DFD9587681E378D819C792
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 34$C]$|F
                                                                                                                                                                                                                                                                        • API String ID: 0-2804560523
                                                                                                                                                                                                                                                                        • Opcode ID: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                                                                                                                                                                                                                                                        • Instruction ID: 2c432fa7c5999ab476cb5019d0599193357fe59285c965ab9162d9f100ef16a5
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7bec5bc3369f6adcf9dfe2aa521af371a2ac693f70b7f14cbe9fa8a8d0a997b9
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E2C1F1B59183118BC720CF28C8816ABB3F2FFD5314F58895DE8D58B390E778A945C79A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 34$C]$|F
                                                                                                                                                                                                                                                                        • API String ID: 0-2804560523
                                                                                                                                                                                                                                                                        • Opcode ID: 1eada1f2f144597b9c88acb577afbeb3828b2161becaae570a9f1b2935c392b3
                                                                                                                                                                                                                                                                        • Instruction ID: 398fe2f8eb79742eff12cf75c7041791e48e728b1183405ff6288ab56afb2871
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1eada1f2f144597b9c88acb577afbeb3828b2161becaae570a9f1b2935c392b3
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 81C111B59483518BCB14CF28C88176BB3F2FF85314F59896CE8D58B394E7789905CB92
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: #XXL$=$BC
                                                                                                                                                                                                                                                                        • API String ID: 0-2546488661
                                                                                                                                                                                                                                                                        • Opcode ID: de1a02a15010d669723b7442fb5946c988934c5b7e4ce427fae25988c8326dc7
                                                                                                                                                                                                                                                                        • Instruction ID: 9bd2012f957da0ff56630068cab070879dad6f1475f4ae026007fe123ff5be4b
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: de1a02a15010d669723b7442fb5946c988934c5b7e4ce427fae25988c8326dc7
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 62C1EBB15083518BD324CF15C8A17ABBBE2FFD1704F0A895ED4C55B3A1EBB88845CB96
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID: 1234$oQ3$sQ3
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-3057079318
                                                                                                                                                                                                                                                                        • Opcode ID: a6f3f14e2653e663308f11d691e247aa7faefb8ce40ce58f1613db28e40f636f
                                                                                                                                                                                                                                                                        • Instruction ID: 8038275947b79c29346f8cf0c7e67bd1178385f5d69ec54105c16415a8137388
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a6f3f14e2653e663308f11d691e247aa7faefb8ce40ce58f1613db28e40f636f
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8DB16472A083118FC728DF28C89056BB7E2EBC9314F19853DE99697365E735ED05CB82
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 12347$oQ3$sQ3
                                                                                                                                                                                                                                                                        • API String ID: 0-1755585375
                                                                                                                                                                                                                                                                        • Opcode ID: d6219592765054223d8b44a29d17a2c15be9e83531692649a6c6d0283300f812
                                                                                                                                                                                                                                                                        • Instruction ID: 4bc83cef97e18c00ecf3eece79e2358cd754f746e9c32e6ab68bcbb98793c226
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d6219592765054223d8b44a29d17a2c15be9e83531692649a6c6d0283300f812
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5DB16672A483518FC729CF28C89096BB7E3EBC5314F1A852CE99697755D732ED02C782
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: Ef$TQ][$sWK)
                                                                                                                                                                                                                                                                        • API String ID: 0-3401374238
                                                                                                                                                                                                                                                                        • Opcode ID: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                                                                                                                                                                                                                                                        • Instruction ID: 19a0c778187f2748ae17dd07c5e08606c1358576a23e797e2c0b4f31c76305c1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2018eb1ddcc6c4d2b6b82b9d22d54321858e2bd23606dd915e7f156b5046d053
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CBB1C33061C3E08ED7398F2994507ABBBE09F97304F48499DD4D95B382DB79850ACBA7
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: Ef$TQ][$sWK)
                                                                                                                                                                                                                                                                        • API String ID: 0-3401374238
                                                                                                                                                                                                                                                                        • Opcode ID: 34b98bce0e098604bc8c30d8401df6549c9b0a7e4ea807236a6bc4bf95e6afdf
                                                                                                                                                                                                                                                                        • Instruction ID: 91c620dc8c9727e4039c603a69e54624849aa0d6feb09eb93f882f3820dcd575
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 34b98bce0e098604bc8c30d8401df6549c9b0a7e4ea807236a6bc4bf95e6afdf
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 34B1F33055D3E08ED7398F2994907ABBFE0AF97304F18899CD4D95B282D775850ACB63
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: +|-~$/pqr$_
                                                                                                                                                                                                                                                                        • API String ID: 0-1379640984
                                                                                                                                                                                                                                                                        • Opcode ID: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                                                                                                                                                                                                                                                        • Instruction ID: 042a524babaaaf1240c13a88dd3a117b8cd22f0ed9ec4b151ea40a3d869026f8
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4a5a7f83b503959aed81fc9274c5a394571bb0f6731898145231dc30ce1a0eba
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D9810A5561495006DB2CDF3489A333BAAD79F84308B2991BFC995CFBABE93CC502874D
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: +|-~$/pqr$_
                                                                                                                                                                                                                                                                        • API String ID: 0-1379640984
                                                                                                                                                                                                                                                                        • Opcode ID: 6cec998220da979fd4d7e4802d464de526f10a737984141f1598214dad803a78
                                                                                                                                                                                                                                                                        • Instruction ID: 06492b4c49ae9f507af7d1f4a3aee1a2bb25c89db91c7e1f3f43c79e497ff208
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6cec998220da979fd4d7e4802d464de526f10a737984141f1598214dad803a78
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 24812D6160459009DB2CDF7888A373BB9D79FC4308B2991BEC955CFBA7EA38C102874D
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: .$GetProcAddress.$l
                                                                                                                                                                                                                                                                        • API String ID: 0-2784972518
                                                                                                                                                                                                                                                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                                                                                                                                                                                        • Instruction ID: 8d3964254565dfb7a40da2e234806515813b4f54de45dc01fec139ea16ba0e7d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 573148B6900609DFDB10CF99C880BAEBBF9FF48324F15404AD845A7250D7B1EA45CBA4
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: NDNK$WJeX$X
                                                                                                                                                                                                                                                                        • API String ID: 0-3631875968
                                                                                                                                                                                                                                                                        • Opcode ID: d11f5f5163d6808065bde529015e1f128c891bcdaf4957bf72f467d8a2f5d03f
                                                                                                                                                                                                                                                                        • Instruction ID: cf94d0fe30943d8c24bbecbd2f6bb2081c7acf2b2714e6432a17449147e04e7d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d11f5f5163d6808065bde529015e1f128c891bcdaf4957bf72f467d8a2f5d03f
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2701BCB051D7908FD3B19F259899A9FBFE4AB82710F21493CC4D9AA210DB3288008F03
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: "51s$9YB
                                                                                                                                                                                                                                                                        • API String ID: 0-2722061943
                                                                                                                                                                                                                                                                        • Opcode ID: 211a046e9116838b58fef2f862f3bc43e5d0a454b8724f73db8adee7e8caa559
                                                                                                                                                                                                                                                                        • Instruction ID: 779a5c1bb40158b59da43047085edf677e041d4ba635d65d9609cd33f89ab022
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 211a046e9116838b58fef2f862f3bc43e5d0a454b8724f73db8adee7e8caa559
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: EE321976B00622CBCB24CF68D8516BFB3B2FF89310B99856DD442AB364DB395D41CB54
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: !@$,
                                                                                                                                                                                                                                                                        • API String ID: 0-2321553346
                                                                                                                                                                                                                                                                        • Opcode ID: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                                                                                                                                                                                                                                                        • Instruction ID: 02546279eb0c4d83f3c4e3be5ab3571bc15c22c1dfd1b9922496e5385efd982e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 00a3d0f56e47fa8dbf69d309b3c8ad0eabeffacace6d1066a3ad4a95fdf331ff
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DB4259B1E042648FDB04CF78D8813AEBFF1AF55310F59826ED895A7391C3798846CB86
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: !@$,
                                                                                                                                                                                                                                                                        • API String ID: 0-2321553346
                                                                                                                                                                                                                                                                        • Opcode ID: 53d5da5660c4a43f8d0f64280c8733e9bdccf6cbe85e2db49c8b0f6515059a90
                                                                                                                                                                                                                                                                        • Instruction ID: 0cf38f4415405445e90020cfec8b18de046c28060a6c62c8ebdde1e9f9846462
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 53d5da5660c4a43f8d0f64280c8733e9bdccf6cbe85e2db49c8b0f6515059a90
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E54229B1D043648FDB04CF78C8853AEBFF1AF45310F198269E8A5AB391D7758959CB82
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: Dx$lev-tolstoi.com
                                                                                                                                                                                                                                                                        • API String ID: 0-818776348
                                                                                                                                                                                                                                                                        • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                                                                                                                                                                                                                        • Instruction ID: 5bb1130f72a98c6f233d2c217a903bc57bb56de3339a3108bfc93ec34e4a158e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A1F1CDB054C3D18ED335CF6594907EBBBE0EB92314F144AAEC8D96B382C735090A8B97
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: Dx$lev-tolstoi.com
                                                                                                                                                                                                                                                                        • API String ID: 0-818776348
                                                                                                                                                                                                                                                                        • Opcode ID: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                                                                                                                                                                                                                        • Instruction ID: afaee67ec680d4b8c6e2928fc9efd653b0b5b042d8002f1f42919edcd6f8434f
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ff34d217169f84ecf3502b05061dc3eb4241f1b5e2f3e4b9a9a76cc037eed5b2
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F2F1BBB054D3D18ED3358F6594C0BEBBFE1AB92318F148AADC8D95B682C775050ACB93
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 0K)$4*VP
                                                                                                                                                                                                                                                                        • API String ID: 0-3626284114
                                                                                                                                                                                                                                                                        • Opcode ID: 958d662d80f610fa8de2bec6fdd7d8beff1fa42db32f20cab0fd5fd8684a20d5
                                                                                                                                                                                                                                                                        • Instruction ID: f422be43faa332863909b8f4902482740ba20fb44f548a9907359dd8b2c0332a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 958d662d80f610fa8de2bec6fdd7d8beff1fa42db32f20cab0fd5fd8684a20d5
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 51D1183065C3E08ED725CF39C4507ABBBE19F93214F1889ADE4D88B382D775940ACB62
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 0K)$4*VP
                                                                                                                                                                                                                                                                        • API String ID: 0-3626284114
                                                                                                                                                                                                                                                                        • Opcode ID: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                                                                                                                                                                                                                                                        • Instruction ID: 79d6e082e0491a4045e5b840a95bb4df230d34c241beba690eb3c8ed7007ce5a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7f9184ee53db8657b7211f9213731764c2e24f7097ca2d92dc8b3e88ab6ab3dd
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8FD12730A1C3D08ED7258F3994507ABBFE19FA7314F59896ED4C98B382C7798406CB66
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: R2B$6B
                                                                                                                                                                                                                                                                        • API String ID: 0-20043878
                                                                                                                                                                                                                                                                        • Opcode ID: ac58904699f18f78ac368c51fcd47e09c00d21abb36880cf37e6842ead4d4e32
                                                                                                                                                                                                                                                                        • Instruction ID: f5db2046e1d380e536cc29ae1ea4695f6a7d49829660d0c0f3bd76f15908f1aa
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ac58904699f18f78ac368c51fcd47e09c00d21abb36880cf37e6842ead4d4e32
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3AD1C276A01116CFDB18CF68DC917AE73B2FB8A311F1A85A9D841E7390DB34AD11CB58
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: XG$|}
                                                                                                                                                                                                                                                                        • API String ID: 0-1014376750
                                                                                                                                                                                                                                                                        • Opcode ID: e601669f8485cc3344b93b58b39bec23c35c7299807bf4f05dda551d1a5ff6f0
                                                                                                                                                                                                                                                                        • Instruction ID: fef0f9a3622c059bd3dca30c9da84c32a684abbcbc54a65241ce9b590edefb0f
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e601669f8485cc3344b93b58b39bec23c35c7299807bf4f05dda551d1a5ff6f0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: ECD122B16083108BD724DF18D8927ABB7F2FFE5354F49891DE5868B3A1E7788801CB56
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: XG$|}
                                                                                                                                                                                                                                                                        • API String ID: 0-1014376750
                                                                                                                                                                                                                                                                        • Opcode ID: dab4d877ca047d4bef4a60ac035a74c1689232e455a040bcd58bfaed14168dbd
                                                                                                                                                                                                                                                                        • Instruction ID: 732fd4c2df78b3164218bf45eb3e52c9b212510cfac348a5f8991d1918c84619
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dab4d877ca047d4bef4a60ac035a74c1689232e455a040bcd58bfaed14168dbd
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F4D104B15483508BD724CF14C892BABB7F2FFC2358F19895CE5998B3A2E7798405CB52
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: )$IEND
                                                                                                                                                                                                                                                                        • API String ID: 0-707183367
                                                                                                                                                                                                                                                                        • Opcode ID: a91b974ffb7970066f5ddd55fbf8d6bd18980178a5d0d12c0270eeeb14f23bc6
                                                                                                                                                                                                                                                                        • Instruction ID: dbf6d47144c6b822b2acdb98883b9d528113f132bac91ec627b85730d464e823
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a91b974ffb7970066f5ddd55fbf8d6bd18980178a5d0d12c0270eeeb14f23bc6
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 34D1CEB15083449FE720CF14D84575FBBE4AB94308F14492EFA99AB3C2E779D908CB96
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: )$IEND
                                                                                                                                                                                                                                                                        • API String ID: 0-707183367
                                                                                                                                                                                                                                                                        • Opcode ID: e75c78a806b7862965fdc8e28a2ab248e9bd6dbcacf7bf91078409fb9652b6c0
                                                                                                                                                                                                                                                                        • Instruction ID: 57b3ce82bfc654a0fbb8ea99c5b3b2c6b2293b346ad034bf0a40b1a85a273bf8
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e75c78a806b7862965fdc8e28a2ab248e9bd6dbcacf7bf91078409fb9652b6c0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9FD1CFB19483449FD720CF14C8C4B5ABBE5AF98304F15892DFA999B3C1E7B5D908CB92
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID: i$r}A
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-2976846027
                                                                                                                                                                                                                                                                        • Opcode ID: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                                                                                                                                                                                                                                                        • Instruction ID: bf893d2c0726f4e317e2b51d5e32a95bc91f637e65c50f94937d3483e244f6d9
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 216b221475836e3855d1b8759aff26348fc53bb82e04dccbb46422255a771982
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4781A83694C351CFD710CF68D8806ABBBE2EBD2300F18496ED8D697252C7389985C7CA
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: d$d
                                                                                                                                                                                                                                                                        • API String ID: 0-195624457
                                                                                                                                                                                                                                                                        • Opcode ID: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                                                                                                                                                                                                                                                        • Instruction ID: a6a5a8ac2d59b7de1a8b575b3a10bb681eff341670204cea3f60d1849e0cf04e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5ae760aa5af7d138e0a7bd51aa20738c42f63bbe965dfb313ec005962f2f09c8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F1513A36908320CBC714CF24D85162BB7D2AB8A718F494A6DECC9A7351D7369D15CB8B
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: P<?$P<?
                                                                                                                                                                                                                                                                        • API String ID: 0-3449142988
                                                                                                                                                                                                                                                                        • Opcode ID: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                                                                                                                                                                                                                                                        • Instruction ID: 58e7122ac3cea56caf2700395258951e32a9ff530ffc896d1714b79e34f88e6e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 15a1e53f96b5dbffac6245dad95bb33219b4ef4f3549f5551b78542ea9aaefbe
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 64312976A44310EFD7208F54C880BBBB7A6F789300F58D92ED5C9A3251DB745C84879B
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID: f
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-1993550816
                                                                                                                                                                                                                                                                        • Opcode ID: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                                                                                                                                                                                                                                                        • Instruction ID: 18f220f42ed12d3f8706e230857eda4cfb4a422739cf4bd3cfbe98504a66e541
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8e9e50587fb6b78e0fa4282dd31e32de0d85a4e7deb78124e5aaaf4c71ac60a2
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8512D3706083418FD715CF28C88176FB7E5EB89314F289A2EE6E597392D734DC058B9A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: bC
                                                                                                                                                                                                                                                                        • API String ID: 0-3681614764
                                                                                                                                                                                                                                                                        • Opcode ID: 81246caaa5fb78c3d38635f3ad354d87a7ab4eb57a3eaf3217e543b2d80e8b50
                                                                                                                                                                                                                                                                        • Instruction ID: 871c5afb2dffc20ff0dbbcf53a0195aac73061a90b0e28cef4dba4d31fdaf636
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 81246caaa5fb78c3d38635f3ad354d87a7ab4eb57a3eaf3217e543b2d80e8b50
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3712E23AA18215CFCB04CF28E8905AAB7B2FF8E311F1A847DD54697351D734A952CB88
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: bC
                                                                                                                                                                                                                                                                        • API String ID: 0-3681614764
                                                                                                                                                                                                                                                                        • Opcode ID: c70fff483ec8e9077dfc10fa089d78eeba6ca480428d69a1677b3b3847d620ad
                                                                                                                                                                                                                                                                        • Instruction ID: 5e30844967bebdc7bd1579877bde578fcf76ae60555b00215fe6639be0914efa
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c70fff483ec8e9077dfc10fa089d78eeba6ca480428d69a1677b3b3847d620ad
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7DF1E436A28215CFCB04CF28E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: bC
                                                                                                                                                                                                                                                                        • API String ID: 0-3681614764
                                                                                                                                                                                                                                                                        • Opcode ID: 1d8feeef0126ffe8c63342afaba4558ed33c57e7ba78c596c66c7e0fa34e77c1
                                                                                                                                                                                                                                                                        • Instruction ID: 5e6aaad999615e2ac42fefb03cf1b536ced96fd12a8bf48793a25e995ad5db17
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1d8feeef0126ffe8c63342afaba4558ed33c57e7ba78c596c66c7e0fa34e77c1
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BAF1E536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: bC
                                                                                                                                                                                                                                                                        • API String ID: 0-3681614764
                                                                                                                                                                                                                                                                        • Opcode ID: b154c6e34f79c6648591b9b450c448a67bbc93cb44fa5396b7d9856807c8a211
                                                                                                                                                                                                                                                                        • Instruction ID: a5988ab96186a7325d1362fbcccc642df08cbf2eaa279a3d6103cdc8c7b46e1e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b154c6e34f79c6648591b9b450c448a67bbc93cb44fa5396b7d9856807c8a211
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B7F1F536A28215CFCB04CF68E8905AAB7F2FF8E311F19847DD94697351D734A952CB88
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: jk
                                                                                                                                                                                                                                                                        • API String ID: 0-78326018
                                                                                                                                                                                                                                                                        • Opcode ID: 25ef1f9adb694a81f93120e111aa8eff1c89ad6ac93ee7fa2faf286b71ff90ec
                                                                                                                                                                                                                                                                        • Instruction ID: 68e7885be5d05e4a2cf040f704cbb8fa7a41bea7ef2f0d8a510bf149587bd7f9
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 25ef1f9adb694a81f93120e111aa8eff1c89ad6ac93ee7fa2faf286b71ff90ec
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DDE1033A618356CBC7188F38DC5126B73E2FF4A351F0AC87DE9818B2A0E779C9558754
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: bC
                                                                                                                                                                                                                                                                        • API String ID: 0-3681614764
                                                                                                                                                                                                                                                                        • Opcode ID: 10f45940bf441a6cd71f6e58040424d3e031c37bab43412074f48cf734061f8b
                                                                                                                                                                                                                                                                        • Instruction ID: 2fa55bda5e41fd724e566356672d144f9f42af162050902131bcbf15531586af
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 10f45940bf441a6cd71f6e58040424d3e031c37bab43412074f48cf734061f8b
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E9E1C376A28215CFCB08CF28E8905AAB7F2FF8E310F19857DD94697351D734A952CB84
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: {}
                                                                                                                                                                                                                                                                        • API String ID: 0-4269290415
                                                                                                                                                                                                                                                                        • Opcode ID: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                                                                                                                                                                                                                                                        • Instruction ID: 0af4e1219fe889d167e9da05173529857e0f89c87775fbd0e3160429af4db955
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ae2110e227aeaa4557827879407c3dbec5839db0e2fe540aba91c9e8bccdbcdd
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 82E101B5608340DFE724DF24E88176FB7B2FB85304F54893DE5859B2A2DB789805CB4A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: "
                                                                                                                                                                                                                                                                        • API String ID: 0-123907689
                                                                                                                                                                                                                                                                        • Opcode ID: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                                                                                                                                                                                                                                                        • Instruction ID: ccf2f4e9833933b2009195e793b8faf6d5d6e2cba860aec0098ae2c38f35b308
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f5bf1b62e76307cdd5fc82252a9a1afcae73f4398661cde8b6da05f895bcd9dc
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FDD11F72B083255FC714CE25A89076BB7DAAF84350F89892EECA987381D738DD15C7C6
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: "
                                                                                                                                                                                                                                                                        • API String ID: 0-123907689
                                                                                                                                                                                                                                                                        • Opcode ID: c49dafb76b3501854f1ecfb32a5253d7c55cb79f5b02df7c17b1cbb688f3955d
                                                                                                                                                                                                                                                                        • Instruction ID: b5f1f69c048e71dd6256e7106886a028e1ba9df013850c44bbee9c1900e8819f
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c49dafb76b3501854f1ecfb32a5253d7c55cb79f5b02df7c17b1cbb688f3955d
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7FD1E67264C3659FD715CE24C88076FB7E6AFC4318F09892DF8A587281D775DA18CB81
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID: /,-
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-1700940157
                                                                                                                                                                                                                                                                        • Opcode ID: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                                                                                                                                                                                                                                                        • Instruction ID: 73ea5f1ed436ac76404857fefd2ddfa4c8367646346d3918638d2e9e73e3d7e7
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e68cf86ee166e556bd12f2f12a5a46f9bc2d0c12cb890ba0df125163a2fef21b
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8EB18E717083014BD714DF25888163BF792EBCA314F14A92EF5D557392DB39EC068B9A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: /,-
                                                                                                                                                                                                                                                                        • API String ID: 0-1700940157
                                                                                                                                                                                                                                                                        • Opcode ID: bd61eaabca8c3d4106ab26b04688d9f0e7a3b9e8178b00c10dfc939fc062fcac
                                                                                                                                                                                                                                                                        • Instruction ID: ff6e636d2149086a14b643f99f1a9c04c0706d3f974f8db0ca34205dbc5df538
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bd61eaabca8c3d4106ab26b04688d9f0e7a3b9e8178b00c10dfc939fc062fcac
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E8B15B716483409FD725CF248880A7BB7A3EF82718F1A993CF59967291D732EC05CB95
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID: VtA
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-3724035812
                                                                                                                                                                                                                                                                        • Opcode ID: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                                                                                                                                                                                                                                                        • Instruction ID: ed71193d6b2bdbbac52031f97d74cd30495a87e66650ae04c888d17f76a05038
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e8c9bba709d658e790e2a6ad064546b7b8b5661d45e7256e4bece47e75e6f2c0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5DC139766083419FD714CF28D8817AFB7E2AB95310F09892EE4D5D7392C738D885C75A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: bC
                                                                                                                                                                                                                                                                        • API String ID: 0-3681614764
                                                                                                                                                                                                                                                                        • Opcode ID: 12f582ca5cb52f02cbb6c7a65b3a2962543ce7e68b8d395708436d5f2da692ba
                                                                                                                                                                                                                                                                        • Instruction ID: 4d20f92c875f40788edf4275f174b054e137e174bc84352c0492b1430194fbac
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 12f582ca5cb52f02cbb6c7a65b3a2962543ce7e68b8d395708436d5f2da692ba
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F3C1C176A28215CFCB08CF68E8905AAB7F2FF8E310F19897DD54597351C734A952CB84
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 9YB
                                                                                                                                                                                                                                                                        • API String ID: 0-659603884
                                                                                                                                                                                                                                                                        • Opcode ID: cc1449e27a0f5531b09e40fa76c2dd5bb8592e6f2d5bdd274fc9f48ccbd80c23
                                                                                                                                                                                                                                                                        • Instruction ID: 1cfe0ac6ad2819008f92b10fbbf01a1b5c50993105dc128c753fe97305f097ae
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: cc1449e27a0f5531b09e40fa76c2dd5bb8592e6f2d5bdd274fc9f48ccbd80c23
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 80B1077AA00215CBDB18CFA9D8916BFB7B2FF89310F58816DD442AB355DB395C42CB84
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: .
                                                                                                                                                                                                                                                                        • API String ID: 0-248832578
                                                                                                                                                                                                                                                                        • Opcode ID: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                                                                                                                                                                                                                                                        • Instruction ID: 2823e07fbbb50db066b2c442ced4ae8f01fbddd957871d70742adaa2677f6ced
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FE912A71E082524BC721CE29CA8025BB7E5AB81350F198A7ED8D5E73D1EA39DD414BC5
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: .
                                                                                                                                                                                                                                                                        • API String ID: 0-248832578
                                                                                                                                                                                                                                                                        • Opcode ID: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                                                                                                                                                                                                                                                        • Instruction ID: b55e688bbe8aa938ff7268583d5429efc86887d2290b0300fd70ee045c4d1450
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2ac21a3dbd00c1a7cfa2cfa9c8571f5cf891ae991bce99d29bc9653d85f38a4a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 39913871E4C3524BC7218E29C8C035ABBE5AB85354F1B8A7AE8D4D73E5E7B4D8418BC1
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                        • API String ID: 0-4108050209
                                                                                                                                                                                                                                                                        • Opcode ID: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                                                                                                                                                                                                                                                        • Instruction ID: 9f054d13e7867a4d77ca7132c07c00ca598ea50f9319f8eda39875565fe9693e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AD914827759A8007D31C9E3D5C622A7BA834BEB330F2DD37EA5B1CB3E5D56888064359
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                        • API String ID: 0-4108050209
                                                                                                                                                                                                                                                                        • Opcode ID: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                                                                                                                                                                                                                                                        • Instruction ID: f926bab5b91f844a2629aaed006025e24fa9d9e08041e4d9e9b2190839f12a9c
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 08d7d0d85d1217bd50795314ef511c4ead64b35a0bf6ca8811da1f806bdc1b7e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C3910B27799A8007C71D9E3C4C522A6BAC34BDB230B2EC37DA5B1CB3E5D76548058355
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,
                                                                                                                                                                                                                                                                        • API String ID: 0-3772416878
                                                                                                                                                                                                                                                                        • Opcode ID: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                                                                                                                                                                                                                                                        • Instruction ID: 72525c85f477075dffe7e14f80d8e4d34094ebf61648e765f9981e94dfd3314a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 88B137711087859FC321DF18C88061BFBE0AFA9704F444A2EF5D997782D675E918CB67
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: ,
                                                                                                                                                                                                                                                                        • API String ID: 0-3772416878
                                                                                                                                                                                                                                                                        • Opcode ID: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                                                                                                                                                                                                                                                        • Instruction ID: 3388b84583c312acd88ec7ae5587842ac015676c312873a664b096f183e9da4f
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: af61cab23f3548dae23a0013b9021eac7b62495e940c422da8dd81882780f669
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5AB148712083819FC325CF18C98061BFBE4AFA9704F444A2DE5D997782D771EA18CBA7
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: gfff
                                                                                                                                                                                                                                                                        • API String ID: 0-1553575800
                                                                                                                                                                                                                                                                        • Opcode ID: 04eae5f35bf542833f546afa72f4753c6069cb9a74afe6c9c0fa956fc9adcb4f
                                                                                                                                                                                                                                                                        • Instruction ID: 47ac126dc4e3c911627a26d09fce30ef838c26896a17218f17083d6629b01d45
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 04eae5f35bf542833f546afa72f4753c6069cb9a74afe6c9c0fa956fc9adcb4f
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A9711572A542518BD328CF28C891BBBBAD6EBC1304F19853DD491DB3E5DB789906C781
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: "
                                                                                                                                                                                                                                                                        • API String ID: 0-123907689
                                                                                                                                                                                                                                                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                                        • Instruction ID: 33b1f2780e14060464d7ed180fcf8b3e4403934f6fcecc96c03af05ff21b71f5
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4A71D732B083358BD714CE28E48432FB7E2EBC5750FA9856EE89497351D7389C4587CA
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: "
                                                                                                                                                                                                                                                                        • API String ID: 0-123907689
                                                                                                                                                                                                                                                                        • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                                        • Instruction ID: 5c3906d19768b565ccc82058557784d89e0ddf8abd19a10a87669b01871321bb
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E071E332A4C3658BD714CE29C88032EB7E2ABC5718F1A852DF4959B391D335DE5DC782
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: klm
                                                                                                                                                                                                                                                                        • API String ID: 0-3800403225
                                                                                                                                                                                                                                                                        • Opcode ID: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                                                                                                                                                                                                                                                        • Instruction ID: fbab8d391cb70804594fb2969dbf4b57704b04da195ac2ac4d1ccbe35a174314
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d5319d95fe68aebd98aaca92b9825a3df1dae6eff9af15c4fe87a1423c5b3b77
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9751F3B4A0D3508BD314EF25D81276BB7F2EFA6348F18856EE4D54B391E7398501CB1A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: klm
                                                                                                                                                                                                                                                                        • API String ID: 0-3800403225
                                                                                                                                                                                                                                                                        • Opcode ID: 22a1d23ffb192b13ce7e4b67b3c031d181d26310d43a75b7846801cd596ae7fb
                                                                                                                                                                                                                                                                        • Instruction ID: 44c2cd9d62a390c56cd5870c0e183925842c22b6f1fd7f9a08cf571e057e523d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 22a1d23ffb192b13ce7e4b67b3c031d181d26310d43a75b7846801cd596ae7fb
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2D51D1B464D3548BD724DF24C45276BB7F2EFA6308F18996CE4D68B290E73A8501CB1A
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: pF
                                                                                                                                                                                                                                                                        • API String ID: 0-4112324664
                                                                                                                                                                                                                                                                        • Opcode ID: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                                                                                                                                                                                                                                                        • Instruction ID: 4b15e4364feff8b1cae5d4f97873799dd65533a9f2e3c3f3723fc524ea0f092f
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fe2049b3d9abf6bd8e08d2fec2b5cc8118d281e5b2e668e1a48ceb0649ab8eab
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6651C572E442698BDB28CF68D8513DEB7B2FB84304F1581BEC55AEB384CB3449468F81
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID: ?^A
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-4120214115
                                                                                                                                                                                                                                                                        • Opcode ID: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                                                                                                                                                                                                                                                        • Instruction ID: 9ee6d34e9011fc7addbd5ae762574014bc539ca284b22a695acd6cfcc742d02e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2c308a6fbd29e83612078340da99c3c212b60cd104204cd4e1c6453a1b582895
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2141783A648300DFE3248B94D880ABBBBA3B7D5310F5D552EC5C527222CB745C81878F
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: 6B
                                                                                                                                                                                                                                                                        • API String ID: 0-4127139157
                                                                                                                                                                                                                                                                        • Opcode ID: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                                                                                                                                                                                                                                                        • Instruction ID: 96ac195b9b02395a12e3507be26d084a31814086cf7b4e33e8fc611c97ddc8d1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e4ae7821e595edd76aaa032931955796ee87cd6bb1a1de6a8bf0ae27a5d1bb00
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 90416A79A05102CFE708CF68EC917A9B3B2FF8A311F5A45B8D545E7390CB74A951CB48
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: $%
                                                                                                                                                                                                                                                                        • API String ID: 0-4214564638
                                                                                                                                                                                                                                                                        • Opcode ID: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                                                                                                                                                                                                                                                        • Instruction ID: 3a12058a654eb28ab9a6ec9325260f0da8ac6e7581b620ea067b04d8af41a39e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d78bc3d5ce02b10deb2a392cf77ba543051be3d806e39ea4f7dd24e4e80accd5
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 694124B0E022298BCB10CF99E8513AEB7B1FF55310F09825DE441AB790E7785941CB64
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: $%
                                                                                                                                                                                                                                                                        • API String ID: 0-4214564638
                                                                                                                                                                                                                                                                        • Opcode ID: 8b76b074fb6ee17701ca33ffcb44bdc905631d8a3bea69b2df4b17f098ff2867
                                                                                                                                                                                                                                                                        • Instruction ID: e2168e439992daad2eaf310aea4c76d73d74704e81fb1dba0685f48e52e28411
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8b76b074fb6ee17701ca33ffcb44bdc905631d8a3bea69b2df4b17f098ff2867
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 434122B0D41229CBCB10CF98DC917EEB7B2FF46310F1A8298E555AB794E3785945CB60
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID: o`
                                                                                                                                                                                                                                                                        • API String ID: 0-3993896143
                                                                                                                                                                                                                                                                        • Opcode ID: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                                                                                                                                                                                                                        • Instruction ID: 0752092ec6bafafb8610a3d24d07d36187e4e84356f2cbc8f66cc2729eab6290
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 62f776dcc95a1318bd9c29a2d25ade0fb881a9597666cacb70b5fb249bcdf744
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FF11E570218380AFC310CFA5CDC1B6EBFE29BC2204F65983DE18597291C775E949DB05
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                                                                                                                                                                                                                                                        • Instruction ID: 1dcbf6391fd41f0c0a817e27e8bafbe762063cd3c7318eef4161125519cd5594
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0417c610e5770e3de08e3f27a6132ce354b413bedc9eba632381f23ebbae40da
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 57424876A083518BD724CF29C8917ABB7E2EFC5310F19892EE4C597351DB38D845CB8A
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 42edef53a1db2b3de2c06a60c4f32876a63e42617b2c0b108f141745477d7c97
                                                                                                                                                                                                                                                                        • Instruction ID: 46ead43bd988ad5b99a16a21c2ab1060e4939541d0428d2c05e05470f57672f5
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 42edef53a1db2b3de2c06a60c4f32876a63e42617b2c0b108f141745477d7c97
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2C52E1715083458FCB14CF18C0806AABFE1FF89305F18897EE8996B391D778E949CB89
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 23751e459ccc9bb6a4f1f3a1e8208e8d277617bd75432395b0e424f8c0ad6651
                                                                                                                                                                                                                                                                        • Instruction ID: 42a8754500a030df467a19eb208a6b75f213c456a02a9d9f5179d7aa03d033db
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 23751e459ccc9bb6a4f1f3a1e8208e8d277617bd75432395b0e424f8c0ad6651
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B952E3B0A08B949FE730CB24C4843A7BBE1AB91314F15483FD5D756BC2C27DB9958B0A
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                                                                                                                                                                                                                                                        • Instruction ID: eeca69a5f7340f21123ee009eae187190c73dcac6119a49f9fb59c3bafe72850
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dbc0620a8ce2ba57e9d910984acef19c89c6c78f1b9d7e948e49654559093e9b
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F152F2B0A48B849FEB35DB24C4C43A7FBE1AB45314F14492ED5EA06BC2C3B9B586C751
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                                                                                                                                                                                                                        • Instruction ID: 7b72874d185f9504f09fa30b763c2e13130ca022e31a023e0d3144396e745bed
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1012A372A0C7118BD725DE18D8806ABB3E1BFC4315F19893ED986A7385D738B8518B87
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                                                                                                                                                                                                                        • Instruction ID: d344d0b493e361b8814bd8349baae8e18b795180742873274ecdfd91c1740945
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 83213a2729f592a7edcd98fc7886bfd8d55118cdf426f5e19ae94b324be42bba
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8E12C332A487518BC725DF18D8806BAF3E2FFC4319F19892DD986972C5D774B812CB86
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                                                                                                                                                                                                                                                        • Instruction ID: 819cfa75d40707277b7651a3d059055683ccfe715dfab14305db8651ec0ec7a0
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c09ab01705470a57d5ac0deba44fab8d122be945ed84d36d91023274058ae07e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8C32E6B5A04B408FD714DF38C5953AABBE1AF45310F188A3ED5EB873D2E638A445CB06
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: a7ebcab429d69887af0994e9597e2f97a4cbfb516015e6b5ad3962d1502a690c
                                                                                                                                                                                                                                                                        • Instruction ID: 92119eba1a81e711891129b31fcfa27aaf65631545f18c9ec8e99bb75fd0e1f1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a7ebcab429d69887af0994e9597e2f97a4cbfb516015e6b5ad3962d1502a690c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4932B471A48B408FD714DF38C89576ABBE2AF49310F098A7DD9EB87381E775A405CB02
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 5aa5d3a12128a26ed9c4319b3588af040b5452ee3ad61b5c13934a671167d9a8
                                                                                                                                                                                                                                                                        • Instruction ID: 1c03f4d1d9da4e588b7eb0090f71902aa376377d07fc1d7850242e2290c7d787
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5aa5d3a12128a26ed9c4319b3588af040b5452ee3ad61b5c13934a671167d9a8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 02322470914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB18
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                                                                                                                                                                                                                                                        • Instruction ID: 29f18d6ea474c1d758972f7e49831a129a62fb75d941a7a03352cba5711c5f95
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d327358085ba1a993c9adccc0f3e0ff780f208ec349b024e73061d52e6553d9c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 753222B0654B118FC368CF29C6D056ABBF2BF45610B504A6ED6A787F90D7B6F884CB10
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                                                                                                                                                                                                                        • Instruction ID: ba4386b7c12eba82c1b0c1a845e92ae21c1426ac82d7aa641ba094e7d1c8bfda
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FE021671A083128BC724CF28C4A16ABB7F1EFE5350F19852DE8C99B351E7389D85C786
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                                                                                                                                                                                                                        • Instruction ID: 730b42c217283a088b9f733182e8fbcb32bf73a010508a097aefafeb4f383e6e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7d4a608daa09243b0b1664d6ac314f1ff4fa7c4c8c111b79aec593db6438873e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DC022371A483128BC724CF28C8A17ABB7F1EFD4314F19992CE8C99B351E7389945C786
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                                                                                                                                                                                                                                                        • Instruction ID: 8cc232c379ab24ad0e8e110b9e0577a2d66b898ca13c535210c4519ca42de900
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2253fead0949c94e28b23ae243de764efe372f7ce01ce19a162629ea64ece33e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: ACF12771E003258BCF24CF58C8516ABB7B2FF95314F198199D896AF355E7389C41CB94
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: e82c242e154504476aa0c4a283c83f7abe834146c9a10b5b44774a429600f0af
                                                                                                                                                                                                                                                                        • Instruction ID: 15177ff1276e0e7f909265a23f452052f4a99dd515370eef8d7062323e6849fb
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e82c242e154504476aa0c4a283c83f7abe834146c9a10b5b44774a429600f0af
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 44F146B1E402258FCF24CF58C8516AAB7B2FF85324F298199E896BF355E7349851CB90
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: a69080f6ad1e69bdb89b54cb009ba2c83e518309b21ccd4fa82cf12907931cd9
                                                                                                                                                                                                                                                                        • Instruction ID: bb9b723667839a33c3fd076cb6daf547bf5b8942c047ca41cb9a19f1e1e822b5
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a69080f6ad1e69bdb89b54cb009ba2c83e518309b21ccd4fa82cf12907931cd9
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A3F1CC356087418FD724CF29C88066BFBE2EFD9300F08882EE5D597391E679E944CB96
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                                                                                                                                                                                                                                                        • Instruction ID: 77dcd355a8a9a2c47cb00ae20dcacb9a201602e58ee87c77b9811b72ac66e3f5
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 76f7eb2ea2dd7941e95dbf1f07b72685953879e74b7f78573d97f49de11c20aa
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9EF1AB356487418FD724CF29C880A6BFBE6AFD8304F48982CE5D587391E7B5E845CB92
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                                                                                                                                                                                                                                                        • Instruction ID: 6af0af9fd07dbea0327a8a302486079f3e258e751aa577ffaaa1b30c4ee5c47c
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5B129D61608BC28ED315CA3C8848756BFD16BA6228F1CC79DD0F94B3D3C27A9546C7A2
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                                                                                                                                                                                                                                                        • Instruction ID: 3bf9e8bf70cf4653eb53e098ee947e29e8c857e80f73023d22a1ded3c84176ae
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 192639fd68e41961d56c7569aed4b7f81ce7132f9cadfac3666f8de3caf69050
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 41127C61608BC28ED315CA3C8848716BFD26BA6224F1CC79DD0F94B3D3C27AD546C7A2
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                                                                                                                                                                                                                                                        • Instruction ID: 473c7c0e01890161c42436878ad5ddc7d20691f55e5b146572409273c410520a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e201d641cfe25c641c2468e7a3483f4a9060aee4472faa5ea81c6e7fcc7eb0d8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CAD1F575609700DBD3209F15D8417EBB3A5FFD6354F184A6EE8C98B391EB389840C79A
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 1cec13f25c1f28221c4ff8f3f288699f7ddc068973911e15d4e3164317524c23
                                                                                                                                                                                                                                                                        • Instruction ID: f741f5702498bd36491996dcac8a37cbec2ca14f2f0ae72db2114c6064f666fe
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1cec13f25c1f28221c4ff8f3f288699f7ddc068973911e15d4e3164317524c23
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 45B1437AA847509FE3298B99C880ABFB7D3FB95310F5E993DC5C2A7611C7309804C796
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-0
                                                                                                                                                                                                                                                                        • Opcode ID: acc099de19a44bf00ce16e18c4be42564cbb2e2978226dbcdc14d31531569d8c
                                                                                                                                                                                                                                                                        • Instruction ID: 0d04b2c2fa50837e9638c4fbed55210e4b06bf37a5b46dbaee5e4e245b9bea77
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: acc099de19a44bf00ce16e18c4be42564cbb2e2978226dbcdc14d31531569d8c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 91B15C717043614BEB18DF24E85266B77A2EB81304F5AC53EE8859B386D63CDC09C79A
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 91e403f7bf2fe428c8ff2ae1696841098b740060b83e87f0c1d5348c1599076f
                                                                                                                                                                                                                                                                        • Instruction ID: eccc371f6d3a6f12ce2ec9b4378a59fb3bcb534bb6316777fc6e57040d12277c
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 91e403f7bf2fe428c8ff2ae1696841098b740060b83e87f0c1d5348c1599076f
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 63B148B17842A54FEB28DF2488916AB77AAEF81304F19853DF8858B3C1D735D82DC791
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                                                                                                                                                                                                                                                        • Instruction ID: c845803a38f6c77acddbfa9eef1216980ece3764384c33bb2f9187d8778c445e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2BF1C0F0904B40AFC3A5CF3AC942797BEECEB0A360F14491EF5AEC2241D73561458BA6
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                                                                                                                                                                                                                                                        • Instruction ID: 2caa5ac1702b1a5e510c8977685530138ff8772cb06ccffb56756a380e43566d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 918cd65cbadabd6da86d83a30b2b2da0488193a68d8c3fca759c00fcea01beb3
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FDF1C3F0904B40BFC3A5CF3AC942797BEEDEB0A260F14491EF5AEC2241D77165058BA2
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                                                                                                                                                                                                                                                        • Instruction ID: 41c3e091da67547de47b3906f8a28cdcf4f9a35dde57214a1a091a27875e02c3
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F0024861508BC18ED3268B3C8848A56BFD26BA6224F0DC79DD4E94F7E3C279D506C762
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                                                                                                                                                                                                                                                        • Instruction ID: ce57bb2874c27160b86a189c2b3eed9e6b48baee2eb7d242df8bfc76770b7cd1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 455de48da1b395ee01d158247e6300201ea3688789ea299f7cc6c50f6c6940d8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F5021861508BC18ED326CB3C8848A16BFD26B66224F0EC79DD4E94B7E3C779D505C762
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                                                                                                                                                                                                                                                        • Instruction ID: 8f62d820d698011493e9b4d33d56c28701bf8a730f1a894cccb9041d930e3295
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 53eb30f04210c5aa1d7ea8e5a987f3c65e47ecdc85497fc231301112acc4fb82
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A4B148B5E00565CFCF10CF59E8417AEB7B1AF0A304F5A407AD899AB342D7399D01CBA9
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-0
                                                                                                                                                                                                                                                                        • Opcode ID: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                                                                                                                                                                                                                                                        • Instruction ID: 3d8e549ead381eb5a41ee94ce64dad1362128fe91ea456cb5e2966e39e4c66ca
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 78baf6bead69bc787f6e498b6209c58df4768a7a1f3029cd250c3ec1940b1aee
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A3B12536A083129BC724CF28C88056BB7E2FF99700F19953DEA8697366E735DC06D785
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 43a38f77119da688ac3ac81b48a3df6363d837cca15ab4ad9599a2e3d82993cc
                                                                                                                                                                                                                                                                        • Instruction ID: 5f54c72dbacd83414d12301c1db5fe2306bf26aae15848e8f8e3da27658ab842
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 43a38f77119da688ac3ac81b48a3df6363d837cca15ab4ad9599a2e3d82993cc
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 54B11536A483118BC729CF28C48056BB7E3FF89714F19857CEA8697765D7319C42C781
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                                                                                                                                                                                                                                                        • Instruction ID: 8a51dd8e2965cc9f0c4013a2f6a7698077ed2e8ce9dcff126952d1e9ceec8530
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 98cb35be4dcf6147bb54d841e08aa9a7e406920ae8f199def00657b733b42f8a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: EFB15579904301AFDB108F25DC41B5ABBE2BFD8314F144A3EF898932A1D776DD668B06
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 3c637dafc4c5c02bba21bf8384fb5f02d2acdfb7e2cfb5a4e70ebd11587584d3
                                                                                                                                                                                                                                                                        • Instruction ID: 1cbdbdbe6f443f77113cb8c1185538a5905b7fe56f634f7a7c4651863755bb15
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3c637dafc4c5c02bba21bf8384fb5f02d2acdfb7e2cfb5a4e70ebd11587584d3
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C3B1E072548301AFD7149F64CC41B1ABBE3BF98354F648A3CF898932A0E7729925CF42
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                                                                                                                                                                                                                                                        • Instruction ID: a24f2a78553098ad8a5e3b5bc8abd089333314a4ae9ebed43d08ec28266042c4
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1235eeb8cf710a390d5557258a43f903d8b0ebafe0fc0a19c3d367544ede0ca8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9D9126B1B04321ABD7209F20DD91B77B3A5EF91318F14482DE9869B381E7B9E904C75A
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: dd71efafbe3cc21deb18af7b1feb0adcacd6565e9113104d404282071b8f505b
                                                                                                                                                                                                                                                                        • Instruction ID: 60f6c12f9a8c7cbb271ce4a663c412032ff5894916296e95418766118abf10e7
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dd71efafbe3cc21deb18af7b1feb0adcacd6565e9113104d404282071b8f505b
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 859104B2A443119BD7249F24C8A1BBBB3A5EF81714F05492CFD869B380E775EC18C792
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: d66196a234f06480f41816911af9b4ea699047e9e12ae4b8e975acb0d7698cc7
                                                                                                                                                                                                                                                                        • Instruction ID: 832fe45fc80474c79b5935d25ba8607f493628b7556cd2e96f027744c4685aa3
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d66196a234f06480f41816911af9b4ea699047e9e12ae4b8e975acb0d7698cc7
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C5A1E3729543228BC324CF24C8906ABF7E1FFD5754F1A8A2DE8C59B7A4E7349941C782
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-0
                                                                                                                                                                                                                                                                        • Opcode ID: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                                                                                                                                                                                                                                                        • Instruction ID: 3187122ed07642cbe4dcf9e03264eeaa439871456ea8a6719abbd84e200541cd
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 69f7ea7b3bcfd880a0eef8db25e79bddcc6229897a0f740fc9fa50f79ffe9049
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4EA11436A043018BC718DF28D99092BB3F2EBC9710F1A957DE9869B365EB35DC05CB46
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 73df037b7ed471f27b11ebbe38ccb4fbfbef165bc0754b8ed2e20a33442e0b7b
                                                                                                                                                                                                                                                                        • Instruction ID: 8713372a967619e497b17b9c3d6f03c449b801d1e040d6eedb1a90d322c19d63
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 73df037b7ed471f27b11ebbe38ccb4fbfbef165bc0754b8ed2e20a33442e0b7b
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 43A1B236A442018BC71ADF28D99092BB3E3FBC5714F1A856CE98A9B755DB31DC02CB41
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                                                                                                                                                                                                                                                        • Instruction ID: afe5d4654f5e8657962bc42cc500043a3620e9a043509faccf93fb76782c58a6
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DBC15BB29087418FC360CF28DC96BABB7F1BF85318F09492DD1DAD6242E778A155CB46
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                                                                                                                                                                                                                                                        • Instruction ID: 96c81ebdedbac63213f58e95add6a1d9edfc0b402a805d3870e90f4738dbc4d4
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bc4bfdbd75c94b69f0a0099a9aec3f3e1abf52cef7a5ad0f4f638173c0b64b08
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 92C16DB2A487818FC374CF68CC96BABB7E1BF85318F08492DD1D9C6242D778A155CB46
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                                                                                                                                                                                                                                                        • Instruction ID: 652f8e9b795bdad566c10a3835dfc4d237c9f110778e3a4e594c84154d78986c
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: eca7b8087cccba19e5979cf0e8330dd1936bd6a3fecaafeec36cf51b3ab145d2
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 43914C72754B1A4BC714DE6CDC9066EB6D2ABD4210F4D423CD8958B3C2EF78AD0587C5
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                                                                                                                                                                                                                                                        • Instruction ID: 89cd8c3f6ac805753dcfa7ea52abb159a623b373aaffce4ab273b97bd3830c78
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6c996c3f4605880eb5795293c8fc84fa0ba55b563aa94cfbc2b65958c9b9224e
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CFB10575608790DFD714DF24E891A2BB7E2EF8A314F488A6DF0D5872A2D7388905CB16
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-0
                                                                                                                                                                                                                                                                        • Opcode ID: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                                                                                                                                                                                                                                                        • Instruction ID: cf6a0fb400f3c0121e69896af41eb3d2a2b4280c5d577effd33442f2baf9bc8c
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7757ad35b4d3f19014e5b0218f9aa537273a9f10abc5234e4bd6fc32e4c2e1b2
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CB81AE326053019BC7249F29C85067FB3A2FFC8710F2AD42DE9868B395EB349C52D785
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 2bb226d847c6d85160f6813aeae79ffa1446c0b5c4b11e29441bf99546017c60
                                                                                                                                                                                                                                                                        • Instruction ID: bc79409c43698a8ffc637e1489f9e64cae1337a281205f166250436119193074
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2bb226d847c6d85160f6813aeae79ffa1446c0b5c4b11e29441bf99546017c60
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: EB816936A443019BC7199F28D850A7BB7A3FFD4710F2AC57CE9868B654EB319C52C781
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitializeThunk
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 2994545307-0
                                                                                                                                                                                                                                                                        • Opcode ID: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                                                                                                                                                                                                                                                        • Instruction ID: ba880319810bdb8e213e259538359e713a98a4b2945b2457ae3d4c78796ecc2a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 28138e8c65325f641ce846c5d717fbfcd9e0028e0a671fa80ee9e5ed8af67cde
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 47512A357043008FE7188F28C89577BB7E2EB9A320F18A62ED5D597392D7389C41C78A
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: b868a3013f37864ed973b3668e501d643bc9a4679fe388745f9f5cf196745faa
                                                                                                                                                                                                                                                                        • Instruction ID: 8895867ae8ba544db32b015d8add0dfbeea26c9619a48650cb06d2d6a8e0d8f6
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b868a3013f37864ed973b3668e501d643bc9a4679fe388745f9f5cf196745faa
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7B51233474C2509BE71A9F29C89567FB7E3FB82328F188A3DD5D5932A1E730A941CB41
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                                                                                                                                                                                                                                                        • Instruction ID: c8e85d340764d3b4d6a043baf240a448254d236dbbdea7acc366692660b189d4
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2a5610294b30e5e8a679adaf8088138694fc7c481e66a98cc5ba01ae8c02aa6d
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C87129B2A042614FC7158E28D84139FBBD1BB95324F18863EE8B9873D2D779C84AD7C1
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 348a960796a6df68399cabf459a6c70aaca195daff6aee637ae217081242f236
                                                                                                                                                                                                                                                                        • Instruction ID: 52451bc8a1aa1dab8ef2f3cb828859ca99fd85f77f6095aba63c5afa8d3765ae
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 348a960796a6df68399cabf459a6c70aaca195daff6aee637ae217081242f236
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5D712572A482624FC715CE28C84075EBBD2AB85364F19823DECB98B3D1D735C90AD7D1
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                                                                                                                                                                                                                                                        • Instruction ID: 4c2c0ab1878e9cfa13c7d80eb19278cb3d77386feaf759a830bf0c171a5c4840
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3C613B3A7496C047D3288E3D4C112AABA934BD7230F2CC77EEDF6873E1D56988469355
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                                                                                                                                                                                                                                                        • Instruction ID: 456a4f4d22e41bc927f86938ae065ba0f663e916fcceacd6ee631f9f5309ebf3
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 29143899424894e7b8e427b1e6e1f66170dacedfe65da3d43b0f1d8a79b00b20
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C861F52A789AC04BE32D8E7C4C612AABA934FD6134F1DC77DE9F5873E1D67588058341
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                                                                                                                                                                                                                                                        • Instruction ID: 19c9bc1ea9186e56c23c5e66cc144f5345884b6a785bfb5c303e44cb60fc86fa
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 93ce565895c2d767d3f4f3cf703cee2db26bdababecfc0e7e91b354ce90ac481
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 915126746083009BE7109F29DC45B2BB7E6EB89704F14982DF5C597292DB39DC05CBAB
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                                                                                                                                                                                                                                                        • Instruction ID: 583c87d3fd9d435e842b0babbfef0573c90b7f3422fd301491a952917507ab78
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0288cd3b192f347070e81ea7353e08bb5565fcf5553c08da131d7bc18d8c1a13
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2E516DB15087549FE314DF29D49435BBBE1BBC8318F044E2EE4E987390E379DA088B96
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                                                                                                                                                                                                                                                        • Instruction ID: 6e37d88637f30dcf1ca5a39760ca9fc235c391d288c19f204446c63a880f3ae7
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fb453cfe87c3d4895fcef5adcba70af742de5fc44f30238646acffd3f92754e0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0951AE30B483648FD710DA28A480267BBD2DF95320F8A867ED4D44B3D6E67DD90DD389
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 516e6924cf22855bcc51b03261ade72ba20a7268c254d95cb2793a6fa0abd341
                                                                                                                                                                                                                                                                        • Instruction ID: 345ec9dffcc15e72eb1d5f7ddd6922d2ccd2fae583d22dfc6cc6b5b308fb1dbd
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 516e6924cf22855bcc51b03261ade72ba20a7268c254d95cb2793a6fa0abd341
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7451AB71AC93E18FD7248F2888C02A6BBD6DF95224F0E867CE5A14B3D6D335991DC781
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                                                                                                                                                                                                                                                        • Instruction ID: 1e023c5d0ae8bc499a1476ddf9e588c272e9bef8a9d0e355e0d1dc09bced5273
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d04a0d8e38c3f294c211cbf0a89a7ee30207864e8a9f5169d07d9085582a6937
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 03615C31D046A18FDB14CF28C85039DBBF1AB4E310F1AC6AAC859AB391C7799C45DF85
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 4f6158e6fd38aad5bf6509a71069262e40ef65b1444f80fe14b24d050b94fc1b
                                                                                                                                                                                                                                                                        • Instruction ID: 78d3180911da3048dc1a76b3d57e457fc9f32e02ff63c8f4ae2f195369ddaec6
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4f6158e6fd38aad5bf6509a71069262e40ef65b1444f80fe14b24d050b94fc1b
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C6510333A101258BD72CCB29CC51AAE3697E7C5324B6F86ADD8A1A72E4CF355C15CB84
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: d6b1564bfa2ad103e6c8e4ea998856fae83061142c01d468a44387b6357ebff0
                                                                                                                                                                                                                                                                        • Instruction ID: 8ac4af3746a7eaa0c00483bfef4148e2638a63c29c9337c5b381b0969f046afc
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d6b1564bfa2ad103e6c8e4ea998856fae83061142c01d468a44387b6357ebff0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7551F4B25482429FCB24CF28C4917AEBBE2AFD5304F59892DE0E9C7391D735D945CB82
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 1185d5c171360cfdeafb0023760535e62ce15bb555072bd2fd4fe12e8bcf947a
                                                                                                                                                                                                                                                                        • Instruction ID: a684e3285960d93b3b4517bbb58a718087146e3e4712f4c64325e74bf054c3b0
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1185d5c171360cfdeafb0023760535e62ce15bb555072bd2fd4fe12e8bcf947a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C841657A684340DFE3248B98C884ABAB793BBD6310F1E553EC4C127751CB755842C7DA
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 1ef048c84a4d0d30155c60ee93ead0c638561ed7b80bb9c5424c616a3cae521d
                                                                                                                                                                                                                                                                        • Instruction ID: bead92f5ff90cd90debf10a1abf23fee9f1ebffb71d3979f188ebc2c65d1b6bd
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1ef048c84a4d0d30155c60ee93ead0c638561ed7b80bb9c5424c616a3cae521d
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 60416C7AA943159BD3345B08CC01F3677A3E791B08F2D853CE941EB296D7719E01A7C5
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 5d40f3589d6db934739ebf9594a1d5e282e52d6bab2cc16f230a3767b41ee887
                                                                                                                                                                                                                                                                        • Instruction ID: de3501302c7a14bf44296ac390a8a8865a3a6ee2f068251bb32ca0692e61c871
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5d40f3589d6db934739ebf9594a1d5e282e52d6bab2cc16f230a3767b41ee887
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C0415B762882059BD715AF18DC4093AB7F3EFD5718F29463CE5A993351D7318E02EB81
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                                                                                                                                                                                                                                                        • Instruction ID: d4e59386902d7f076a599dd24da1785c797e999f3f2e44946b1e4a57c50fb419
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 13319B33BA87504BD304DB628C886ABE586AFD1764F0D466DE8D4773D2C9B49C0183DD
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                                                                                                                                                                                                                                                        • Instruction ID: 1b49073602de9181d9a8f15c273fe3d056240112c6fe42715ffb8db801c87500
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 80a270cec9775b927bc727ae391425bd2de1f56668aa53b1f5ee410799ab9563
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FE318033BD83900FD304DB618CC8AAAE5979FC5724F1E454DD895A77D1CBB09902CB99
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 650eb172e118ef885b582a1f2118d399d062a96475d7e344e0e0ea62cb8c0cfa
                                                                                                                                                                                                                                                                        • Instruction ID: 21a4bd41bafd64b6f5514a13f6bf7ffa6b47213692ddc38d73ab05b9b0ff1b2a
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 650eb172e118ef885b582a1f2118d399d062a96475d7e344e0e0ea62cb8c0cfa
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A431AA36584249EFDB258F94C880E7EFBA3FB81320F09543DD9C527261C7329942CB86
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 01c010b77cb3c6354ab597c6acc6aaa608f20e90445c07501ea0d45f4b435f52
                                                                                                                                                                                                                                                                        • Instruction ID: 0fa5480f0b5fa4a739078361986ed371a5353edbe3fdc77b36b2e9f37a996c48
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 01c010b77cb3c6354ab597c6acc6aaa608f20e90445c07501ea0d45f4b435f52
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: EF31487BA88221ABC3259B08DC4067A73A3EBD531CF5E8538C8D597312D7316D01EBC1
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 699edd7276c8ad0d309fdbde42b95b82db78e11e2160b820c2e1cb96630937e1
                                                                                                                                                                                                                                                                        • Instruction ID: bf6f735e164bc188bbdd8a4d524ee5a086ec07e62f057cd3baf886dc16f19141
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 699edd7276c8ad0d309fdbde42b95b82db78e11e2160b820c2e1cb96630937e1
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E541F333E105218BD71CCF69CC516BE76A3ABC531475E82ACD861EB295DB359C02CBC0
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 7e079517465845483c92d3a324a13df3ad619da0cd9ef97a3afcc48b4d234617
                                                                                                                                                                                                                                                                        • Instruction ID: 4c860b8940b009e5e6d9ab24f75debac8cc3a08d3d619a333a161754e32a6909
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7e079517465845483c92d3a324a13df3ad619da0cd9ef97a3afcc48b4d234617
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A4318B36A80723CB8728CF9CC8D05EEB3B2FF89B407968569D541AB374D7306D64D694
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                                                                                                                                                                                                                                                        • Instruction ID: f52b03c38bbf71025152a8b77a79184c4a140196803d3bef29f19ac7e076952c
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2241D2B1E102285FDB24CF788C5279EBAB6EB95300F1181BDD849EB285E7340D468F92
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                                                                                                                                                                                                                                                        • Instruction ID: b8f6f8e77cb70de78d39375d36d60c512dda1c624306d5429615c533328b1898
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 70a5542dbed4291c7f0e4c69363a5fae7bd86cdcdd8d89fd126e446a51f24cc8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5E41D5B1E102285FDB24CF788C5279EBAB6EB85300F1581BDD449FB281E7340D468F92
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: e42cdc780338998972cb1cbc14932b8cb1ea3de4fce98a2356dd7462f473f1f4
                                                                                                                                                                                                                                                                        • Instruction ID: e6c160f938fd184a53f654ca4d6d481bbc1acc5553db4160c8861f75f47c7f2d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e42cdc780338998972cb1cbc14932b8cb1ea3de4fce98a2356dd7462f473f1f4
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3C3135B15183409BC3309F28C845BABB3E6FFC2364F444A28E4D59B791EB748801CB52
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                                                                                                                                                                                                                                                        • Instruction ID: f5f621b67306c00f1b1f1892e0c4b111cdc11732c84e43f9357b9df5953cc386
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6719c340687af9c7671d69fd13b02110751ddfc4bfd7c22202d719cfaa6f9092
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3E7160B840AB848FE774DF04D45868ABBE0FB8A358F52991ED48C47311C7B92448CF9B
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 43ed2d0cd7e23cb56a2031a010359021465c5d9ae3fc3a1ff7632189df559008
                                                                                                                                                                                                                                                                        • Instruction ID: 544ffaa37a3ec6511595a8e93e0cafbba18cc13bdff93265fcf7b8b5d3ddbfdf
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 43ed2d0cd7e23cb56a2031a010359021465c5d9ae3fc3a1ff7632189df559008
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 91314676A882409BD3208B68C884BBFB7E7A7C5320F2C853DD5C597249CB3598818786
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                                                                                                                                                                                                                                                        • Instruction ID: 24e83879a734b152f463eb7ca99c156da8292c87067313e83d08c5c08021f5dd
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3ac257c9c1b75187117c336eb7496787fabe20a4f9f742b947e5c359f3d43b3c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6421F831E083500BD718CF39989116BFBD29BDF224F18D53DD4A697395CA38ED068A49
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 1bd5c86e3cd12e28ed28727b1f2d063bfe7e67913eaebacecbba6bc732c4744b
                                                                                                                                                                                                                                                                        • Instruction ID: d5ac9f639790b403312fbdac424a8ff2598f5a69e95d65f1607c8478c1e90f5b
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1bd5c86e3cd12e28ed28727b1f2d063bfe7e67913eaebacecbba6bc732c4744b
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D81104B86483919BCB18CF24D89097E73AAFF56348F14683CF1819B2A5D735C919CB16
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                                                                                                                                                                                                                                                        • Instruction ID: 2e66319cfaede8187dee7502eb2bdf6532bbee011b37898b3e62ff9ec94ea10c
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bd0ee31e4d4d6d9ac2fa2587f77cf37721911ca3e59ccc36e7bfb755614f87b6
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2C1166324092905AC314CB289940737BBE19B87310F584A5DF4D6E32E1D728CC028B8A
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 57a1d6dc959a99ffce52465f3ced87fece6d02db5f489f15dd164950e6412c6f
                                                                                                                                                                                                                                                                        • Instruction ID: f784a0e32b6a32adc0ee91ae79e698a51afa691bebc335d6681d782c1a2179ef
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 57a1d6dc959a99ffce52465f3ced87fece6d02db5f489f15dd164950e6412c6f
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0421277B684250AFC3144F48D88157BB3A3EBD1308F5A443CE89967311C735ED05ABD5
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 4f9a145d1016b4b0f711bdeb502ec5b34ea66807830c0b234bdd3adf214441fd
                                                                                                                                                                                                                                                                        • Instruction ID: d658f5b1a83fec5742cabccbfa62be333c90e91ac7e9076146c31a82a8854bad
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4f9a145d1016b4b0f711bdeb502ec5b34ea66807830c0b234bdd3adf214441fd
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 421156324CD2E09BC329CB28994073ABBE25B97610F585A6DF4D6E32D1D734CD06C782
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: f1935557e2f2806b9940cce5b2d267874e1034516f04e5d51b8115aeefe7cdf9
                                                                                                                                                                                                                                                                        • Instruction ID: 9c311c71b37e273ea9e7b0174ca22f822f65d5be1eaa1da17cd9e3e45a937476
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f1935557e2f2806b9940cce5b2d267874e1034516f04e5d51b8115aeefe7cdf9
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 22115772B0979147E72CCE3984213BBBAD2ABD6318F2DC57CC4C697249CB3984018749
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                                        • Instruction ID: 1bdb52c757136d0f491bb15e4131204bafb517a34a554dccf387603b88e59a22
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4D11EC336055D40EC3198D3C84006657FD31AB7235F6953DAF4B89B2D3D5268DCA8359
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                                        • Instruction ID: b4885dc74480ccc3e1dc3ef6c708b645fcaf277c8de4f5b9e5a56fe88a923815
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E611E933A451D04EC3278D3C84105A5BFE30A97974FD94399F4B89B2D2D7238D8B8791
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                                                                                                                                                                                                                                                        • Instruction ID: 3de76f9d274b52e90d2ef9e87ec8d3366dafd7d2e10265ff4f1f4711345407d1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b077483ebbe41559666eb24632921f170fd341de44e0cb4593afb61e9b0962fb
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7601B1F570171147D720AE51A9C0B27B2B86FC0748F19443EEC4457342DB7DEC29869E
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: e4a6bce38bb77cb855b0c1b2651f63ca23977da10de64c19d828eeec774b109c
                                                                                                                                                                                                                                                                        • Instruction ID: 32913afa529053846b31325b10ed32d1fcec87fa74c4ec47bc45f895313e3c80
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e4a6bce38bb77cb855b0c1b2651f63ca23977da10de64c19d828eeec774b109c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9101D8F16407118FDF209E1284C0B37B7AA6F84704F1A042CE5456B240EB73E829C791
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677960315.0000000000670000.00000040.00001000.00020000.00000000.sdmp, Offset: 00670000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_670000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                                                                                                                                                                                        • Instruction ID: 747c23378ac153592e8f091650dfb8ce1add9590bcca70da66bdbbbe0b5e06bf
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 28113CB2340100EFE754DE55DCC1FA673EAEB89330B298069ED08CB316D676E842C760
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                                                                                                                                                                                        • Instruction ID: d3147169a0349a9176419bc51c0031599c2ee13a83e26a4a9cefd83b6132c670
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2301DB766506048FDF21CF24C854BBA33F5FB89215F5544B5E506D73C2E7B4A941CB90
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                                                                                                                                                                                                                                                        • Instruction ID: 34e981112378c59cf45707eac27e4188cbaca79d234523b47ecff1cb0040ee73
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7d6529698e20a6c769e7980251b0ca5e132cff0518f497c1ab8b00d6e4c79072
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 59016DB9C00624EFEF00AF55DC01B9E77B6AB0A324F0414A5E508BB392D731ED10CB95
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 6136a0a86494c0451f0a8cc20dd56009850612ffaa73c5348e62317f6daaf908
                                                                                                                                                                                                                                                                        • Instruction ID: 455c32419bf9d5b0bd5ea26facad2f21c856e471ffa526ef5926d5f584b3c43f
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6136a0a86494c0451f0a8cc20dd56009850612ffaa73c5348e62317f6daaf908
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8EF0FEB2D416149FDF40EB98CC41E9A77BAAF0A310F190490F508BB260D662FD10CF95
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                                                                                                                                                                                                                                                        • Instruction ID: 76115147780e5b0d0309e2a0309811062aead7e9691d40ac881d7231c88a4ab0
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3b41fa5205d4ae5a3fd68479d9a62f5c8f3548fe329d4af70c97534e327c91f5
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 23E0D8FFD556600397548A235C02226B1936BDA628B1AB8788E9673707EA359C0741D8
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                                                                                                                                                                                                                                                        • Instruction ID: 8488e0a8640df04fcf481087a0a0e2354c4894f8e99b76394d31cfc5082ce78b
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d3e382a35f6a7edaa88fbd4097d4fd738d9cf468eed6d2bef4b4d717b7d72e8c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6BE01279C11100BFDE046B11FC0161CBA72B76630BF46213AE40873232EF35A436A75D
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 03be019c7f84eab5680fd60e5a6e0a4c14760194c7c122451d5e0e1049be607d
                                                                                                                                                                                                                                                                        • Instruction ID: a2cfdef8284484f034a3bfc8b9e28b4cac1e72e9dfbb1ffb3c0b0ef08f8358c4
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 03be019c7f84eab5680fd60e5a6e0a4c14760194c7c122451d5e0e1049be607d
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D9E0E575C91100EFDB027B11FC00A1C7EB3AB62302B961175E408A3230FF329A2AFB59
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 627599c8012a5de30bed4bcc5cdf041527b351da4d44e435234bf5fd0dbcc5af
                                                                                                                                                                                                                                                                        • Instruction ID: 025dc38d7f3a6569d5b65b133a6138a4d6530be7b88f4406820892e7b6c9eb59
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 627599c8012a5de30bed4bcc5cdf041527b351da4d44e435234bf5fd0dbcc5af
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 52D02B718488B3830F198D14412023997171A031043AE0190A8D07F7C2E712CC2B42E4
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                                                                                                                                                                                                                                                        • Instruction ID: 6e3621e5ba52bd1720ea54ad2d17b774c7841a8325dce5c8bd5a6b1d086829a3
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9580c00f8d87a75d1cefbcc58e71a064fbff43a3de15b5db8def70aaa11ec223
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 36D0C279815910CBDB047F01EC0216A73F4AB03389F04007CE88123263DB39D8288E8E
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: b699e929166f3269f3c0af6cf854a66d2adcb16623502ccf6fa341cc05aeb82f
                                                                                                                                                                                                                                                                        • Instruction ID: 5ae61b718e14a9e00d5eef99870e17a8c33e48647c2d3cfbf6e8a657c1a62e60
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b699e929166f3269f3c0af6cf854a66d2adcb16623502ccf6fa341cc05aeb82f
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3DD09E72C54244AFD941DF00DC41B6AB3BAFF4A704F441565B988B1161E762DA288F57
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                                                                                                                                                                                                                                                        • Instruction ID: f6de81edf4edbd36f0565e031b671f89904ab193cb181933f1b50bd017efe36b
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 49296dab776a215db2218e93475e1eaebcd65e3db626a3e2e0a563717988ad4a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C9D0127BF9210047DA099F11DD43775666393C770870DE1398805E3348DE3CD41A840E
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: a8f9aa8a7fabceb26a773c801b96314e67806ff88a01327c7cabaf7e1195b6db
                                                                                                                                                                                                                                                                        • Instruction ID: 63fe353c318ec3f341cab5325b81195a3673610cbe7ff9f243c9cd32622c01c1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a8f9aa8a7fabceb26a773c801b96314e67806ff88a01327c7cabaf7e1195b6db
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B7D0127BFD21004B9A099F10DD43B756A6397C770470DE1348905D3348EB3DD41AC40E
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                                                                                                                                                                                                                        • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                                                                                                                                                                                                                        • Instruction ID: c40df4f40b565673574f117b3b393b79a76a3f9a491c552766a49f6821d64b0d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 77b0f56a3a3e1bb8ea188a0444bb5e5b9921abf6ae6ebc879750073e405f2179
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: ACC012BCA4C10187D7088F10EC05735B636E797A01F14E125C441232A5C630A403860C
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 341987432dce9904f649f917b7ed575f0bb4bb5c5b4e9ef9425cd867c06a6129
                                                                                                                                                                                                                                                                        • Instruction ID: 0cc2a58349389bc2267ab0b3dc483be3086937ebebb82232a310bbb087e58975
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 341987432dce9904f649f917b7ed575f0bb4bb5c5b4e9ef9425cd867c06a6129
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DAB092B1C9AC108F94113F202C418AAB6261D17340F052030C94626240BB67DA2A889F
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: f753dbc925eeb97c78fc90efc39af23615c529da2cdf343c0b9dd0ba408761e0
                                                                                                                                                                                                                                                                        • Instruction ID: 4951755ea4dae30c95c062d5b1b5602f3b80fe344703468817ae1ffb2012ed6d
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f753dbc925eeb97c78fc90efc39af23615c529da2cdf343c0b9dd0ba408761e0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5BB011E0C88A00CBE800AF20AC80832A23C8A0B220F003820C008EB202E232E8008A0E
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                        • Opcode ID: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                                                                                                                                                                                                                                                        • Instruction ID: 02d06448f02dd76ad61b8ab648816bdf30096f71157e536fee4757e064133957
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 11edc8d7ae4c917e56862e9043f01123a23c23558e3e2cb29e810181f8f007cd
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AEA022F8C0A800C3E800CF20BC02030F23C830B2A8F00303AE00CF3203EA30E0088A0E
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: AllocString
                                                                                                                                                                                                                                                                        • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                                                                                                                                                                                                                        • API String ID: 2525500382-534244583
                                                                                                                                                                                                                                                                        • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                                                                                                                                                                                                                        • Instruction ID: e2dddc40eb3f9dab4f65535c588d3d72a3f147e4bda3b82f36fbc837b78308fa
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8481066010CBC28AD322C63C881875FBFD15BE7224F184B9DE1F58B3E6D6A98146C767
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: AllocString
                                                                                                                                                                                                                                                                        • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                                                                                                                                                                                                                        • API String ID: 2525500382-534244583
                                                                                                                                                                                                                                                                        • Opcode ID: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                                                                                                                                                                                                                        • Instruction ID: 6022c4ac2c9edff0501a10c5fb62fe0b57f3013b53379f80e29447a023dca8fc
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 88941a0f473d950aaf799373c472504fdf4e728c02f445fde5d667b58de91daa
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F581066010CBC289D326C63C881875FBFD15BE7224F188B9DE1F94B3E6D6A58146C767
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: AllocString
                                                                                                                                                                                                                                                                        • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                                                                                                                                                                                                                        • API String ID: 2525500382-534244583
                                                                                                                                                                                                                                                                        • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                                                                                                                                                                                                                        • Instruction ID: e21bf8ef08eaefae2f6608d65dd533aaf672cde794620ee92b713000d27e8169
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9981F52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: AllocString
                                                                                                                                                                                                                                                                        • String ID: $#$/$0$0$4$;$B$B$G$H$J$O$Q$]$^$m$n${$~
                                                                                                                                                                                                                                                                        • API String ID: 2525500382-534244583
                                                                                                                                                                                                                                                                        • Opcode ID: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                                                                                                                                                                                                                        • Instruction ID: 45cc6e6fde8a31f38507e5645b26fea9ec29a0e9a81d851dc94b15fa0a17d15e
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bfb36de6ec62216300921940dd90e50556119a09abea61977352c50feb6b8cd0
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BB81E52010CBC289D326C63C885875FBFD16BE7224F184B9DE1F58B3E6D6A98146C727
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                        • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                                                                                                                                                                                                                        • API String ID: 2610073882-1095711290
                                                                                                                                                                                                                                                                        • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                                                                                                                                                                                                                        • Instruction ID: 67e1650e07e25dd8c979730081919a9ec74336f1c366e84b3847a4c8d399cf69
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 19410921108BC1CED726CF388488646BFA16F66224F0886DDD8E54F3DBC775D51AC7A6
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                        • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                                                                                                                                                                                                                        • API String ID: 2610073882-1095711290
                                                                                                                                                                                                                                                                        • Opcode ID: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                                                                                                                                                                                                                        • Instruction ID: 35ba54198d5b8deda0b703adcd16939c0abe631de201fa5ddb4575e377d12c1f
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7ffbdfa689dec1bd21887cc542622a7e9519c13530b26af4dda8f001440ba417
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6D410921108BC1CED726CF388488646BFA1AF66224F0886DDD8E54F3DBC775D51AC7A6
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                        • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                                                                                                                                                                                                                        • API String ID: 2610073882-1095711290
                                                                                                                                                                                                                                                                        • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                                                                                                                                                                                                                        • Instruction ID: 5aee6742307bd22be2b72699ebf7517107c7abda4f37a595e92ffc77e439cf83
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 34410820108BC1CED726CF3C9488616BFA16B66224F488ADDD8E54F3DBC375D51ACB66
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                        • String ID: ($*$,$-$.$0$2$4$6$8$:$<$>$Q$T$W$b
                                                                                                                                                                                                                                                                        • API String ID: 2610073882-1095711290
                                                                                                                                                                                                                                                                        • Opcode ID: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                                                                                                                                                                                                                        • Instruction ID: 9ef541068ab8a4524e21d80fdd8ba39c826a42869b83ccddf5c3b6bb846a710b
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f781027231551062226cb081f6f7d4146a3b5f5555bc5acf262f956389af0b84
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8441E820108BC1CED726CF3C9498616BFA16B66224F088ADDD8E54F3DBC375D51ACB66
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitVariant
                                                                                                                                                                                                                                                                        • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                                                                                                                                                                                                                        • API String ID: 1927566239-3011065302
                                                                                                                                                                                                                                                                        • Opcode ID: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                                                                                                                                                                                                                                                        • Instruction ID: 53b19800ce9beadd92bbeaf8c0dd5e513984ffb5c5a49c85e3815ab243118963
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 525d7f934687ab0bf19ac530d90f1e1fa4e045b28120346783632a559e286019
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0541097010C7C18AD365DB28849878BBFE16B96314F885A9CE6E94B3E2C7798409C757
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitVariant
                                                                                                                                                                                                                                                                        • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                                                                                                                                                                                                                        • API String ID: 1927566239-3011065302
                                                                                                                                                                                                                                                                        • Opcode ID: 38b59cd13938fe8317dc7d58eddabe9e0085401b214a797582b7f2cd6e6565e9
                                                                                                                                                                                                                                                                        • Instruction ID: ceb3b2e94ddf0da816de66cf05363cf1ede8cd1818aaa391fe47462cbd3c68d1
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 38b59cd13938fe8317dc7d58eddabe9e0085401b214a797582b7f2cd6e6565e9
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F441097110C7C18AD365DB28849878FBFE16B96314F885A9CE5E94B3E2C7798405CB53
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitVariant
                                                                                                                                                                                                                                                                        • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                                                                                                                                                                                                                        • API String ID: 1927566239-3011065302
                                                                                                                                                                                                                                                                        • Opcode ID: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                                                                                                                                                                                                                                                        • Instruction ID: f917ff13e8fa353cdd9af704c32342f25a9e0069aca0bae3d4b305f03d6e9fde
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2ee573a903be5f004d3e2d813880161334ac93031f736f9e15fdb26375ef605a
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F841187000D7C18AD3619B28849874FBFE06BA7324F885A9DF6E84B3E2C77984498757
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: InitVariant
                                                                                                                                                                                                                                                                        • String ID: @$@$A$C$E$H$J$L$Q$X$X$[$[$e
                                                                                                                                                                                                                                                                        • API String ID: 1927566239-3011065302
                                                                                                                                                                                                                                                                        • Opcode ID: 1f6040f1df59cba3b40ed0df49f13582157b33a0c7b331a145014ed0c7e5c107
                                                                                                                                                                                                                                                                        • Instruction ID: a1a7d33dd95305c189faf1da8ce3f6408acd6c1563c3a3a4f2583e0ad92e27e8
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1f6040f1df59cba3b40ed0df49f13582157b33a0c7b331a145014ed0c7e5c107
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 58411B7000D7C18ED3659B28849874FBFE16B97224F885A9CF6E84B3E2C7798449C753
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                        • String ID: A$e$e$n$p$p$v$w$z$z
                                                                                                                                                                                                                                                                        • API String ID: 2610073882-1114116150
                                                                                                                                                                                                                                                                        • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                                                                                                                                                                                                                        • Instruction ID: 776134ba1da329d7d35a817d8e2b42585fa70f537528e7a9cdeab4ed979499a7
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2641383160C7C18ED331DB38885879BBFD1ABA6324F088AADD4E9872D6D7794505C763
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                        • String ID: A$e$e$n$p$p$v$w$z$z
                                                                                                                                                                                                                                                                        • API String ID: 2610073882-1114116150
                                                                                                                                                                                                                                                                        • Opcode ID: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                                                                                                                                                                                                                        • Instruction ID: fa6c9892ff7f6b4d7dd3f6fe81b1604e60b911536511b6954d64b729251cd688
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 285518986e989cac88369cedce0e1c7570f99f932fa8b56f27ac7dcd310c1e64
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5641383160C7C18ED331DB38885879BBFD2ABA6324F088AADD4E9872D6D7794505C763
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1678096710.0000000002100000.00000040.00001000.00020000.00000000.sdmp, Offset: 02100000, based on PE: false
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_2100000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Yara matches
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                        • API String ID: 1006321803-0
                                                                                                                                                                                                                                                                        • Opcode ID: c4fbd4c85c730b82bb0d4d983bd35fb8fa0bc5b81fa1c667f8f1a84b0218d30c
                                                                                                                                                                                                                                                                        • Instruction ID: 1d3033038d9001bc718cfe72c34da5e21c2a388bbeb2fccd7c2d8bcb756131ee
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c4fbd4c85c730b82bb0d4d983bd35fb8fa0bc5b81fa1c667f8f1a84b0218d30c
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DA5105F1D086928FD701BB78C44936EFFE1AB41310F058639D9A997381D3799954C793
                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                        • Source File: 00000000.00000002.1677567857.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                                                                                                                        • Associated: 00000000.00000002.1677567857.0000000000452000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_0_2_400000_BZuk2UI1RC.jbxd
                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                        • API ID: FreeLibrary
                                                                                                                                                                                                                                                                        • String ID: Wu
                                                                                                                                                                                                                                                                        • API String ID: 3664257935-4083010176
                                                                                                                                                                                                                                                                        • Opcode ID: 9afe16709b635edc46db45a4dc63f988e76f552cbb384c5dec0475105d426cf8
                                                                                                                                                                                                                                                                        • Instruction ID: 023303e962689a797e65a05037f9f777abe5289ef5a5f996be967a955c3fa6a7
                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9afe16709b635edc46db45a4dc63f988e76f552cbb384c5dec0475105d426cf8
                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DFC002BA818001AFCE016B61FC198187A23BB563067A809B4F80941536EB624D2BDA1E