Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5RRVBiCpFI.exe

Overview

General Information

Sample name:5RRVBiCpFI.exe
renamed because original name is a hash value
Original sample name:7fc182ca899a18d31e703dc27449a876.exe
Analysis ID:1580855
MD5:7fc182ca899a18d31e703dc27449a876
SHA1:35575d85bde2dfa1668d4eca4d70d41e0b1e1736
SHA256:93b56f4f608b2c3e894be0169dd92cc9012bde01568a22e4d6a44601657cb86b
Tags:exeLummaStealeruser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Contains functionality to call native functions
Contains functionality to read the PEB
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 5RRVBiCpFI.exe (PID: 6864 cmdline: "C:\Users\user\Desktop\5RRVBiCpFI.exe" MD5: 7FC182CA899A18D31E703DC27449A876)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["deafeninggeh.biz", "sordid-snaked.cyou", "awake-weaves.cyou", "debonairnukk.xyz", "immureprech.biz", "diffuculttan.xyz", "wrathful-jammy.cyou", "tackybrushz.click", "effecterectz.xyz"], "Build id": "NFFFFFFFFF--*"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
      • 0x4abc0:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
      • 0x4e156:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
      decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-26T12:07:12.528493+010020283713Unknown Traffic192.168.2.449731104.21.42.145443TCP
        2024-12-26T12:07:14.827336+010020283713Unknown Traffic192.168.2.449732104.21.42.145443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-26T12:07:13.448413+010020546531A Network Trojan was detected192.168.2.449731104.21.42.145443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-12-26T12:07:13.448413+010020498361A Network Trojan was detected192.168.2.449731104.21.42.145443TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 5RRVBiCpFI.exe.6864.0.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["deafeninggeh.biz", "sordid-snaked.cyou", "awake-weaves.cyou", "debonairnukk.xyz", "immureprech.biz", "diffuculttan.xyz", "wrathful-jammy.cyou", "tackybrushz.click", "effecterectz.xyz"], "Build id": "NFFFFFFFFF--*"}
        Source: 5RRVBiCpFI.exeVirustotal: Detection: 61%Perma Link
        Source: 5RRVBiCpFI.exeReversingLabs: Detection: 60%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: sordid-snaked.cyou
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: awake-weaves.cyou
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: wrathful-jammy.cyou
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: debonairnukk.xyz
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: diffuculttan.xyz
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: effecterectz.xyz
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: deafeninggeh.biz
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: immureprech.biz
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: tackybrushz.click
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmpString decryptor: Jwquln--1312YT
        Source: 5RRVBiCpFI.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: unknownHTTPS traffic detected: 104.21.42.145:443 -> 192.168.2.4:49731 version: TLS 1.2
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-78E52646h]0_2_022BB234
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-46h]0_2_022BB234
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+16h]0_2_022BB234
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_022DE218
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_022DE269
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_022DE25A
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov edx, dword ptr [ebp-10h]0_2_022EC2AB
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A896961Ch0_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E83E51Eh0_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 6E83E51Eh0_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 67F3D776h0_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B7C1BB11h0_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 6E83E51Eh0_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h0_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+0233DBB1h]0_2_022DA28D
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_022BF2D6
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edx, byte ptr [esi+eax-00000089h]0_2_022BF2D6
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx ebx, byte ptr [eax+ecx-3F9DFECCh]0_2_022C036F
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_022DD030
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022DD030
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then jmp eax0_2_022D8006
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then jmp ecx0_2_022EE068
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov edx, eax0_2_022D9064
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, dword ptr [esi+64h]0_2_022CA0AC
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000BFh]0_2_022C90B6
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp word ptr [ebx+ecx], 0000h0_2_022D20E4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022C60D3
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+000000B8h]0_2_022DD02B
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022DD02B
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_022E5164
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov byte ptr [esi], cl0_2_022DE17E
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov eax, edx0_2_022CE1EE
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov word ptr [eax], cx0_2_022C81D4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CAA82E26h0_2_022EE654
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ebp, dword ptr [eax]0_2_022E8734
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022BC474
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov edx, ecx0_2_022BC474
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+38h]0_2_022BE44B
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+edx]0_2_022D04E4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_022DB4E4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h0_2_022D74C4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx ecx, di0_2_022D74C4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movsx eax, byte ptr [esi]0_2_022ED4D5
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], A269EEEFh0_2_022E8508
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov esi, eax0_2_022D5568
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022EC5E6
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov byte ptr [ebp+00h], al0_2_022CFAB4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov byte ptr [edi], al0_2_022BEB27
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx eax, byte ptr [eax+ecx-6A653384h]0_2_022BEB27
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then jmp eax0_2_022EDB35
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_022ECB9C
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_022ECB9C
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_022ECB91
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_022ECB91
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov word ptr [ebx], dx0_2_022CA802
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_022CA802
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022D3844
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov word ptr [eax], dx0_2_022C7846
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edi, byte ptr [edx+ecx]0_2_022BF859
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], E88DDEA1h0_2_022EE894
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, edx0_2_022BD8FD
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022DC97C
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022DC958
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then jmp eax0_2_022D89B1
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022DC928
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+20h]0_2_022D79C4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 88822328h0_2_022EE9C4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [ecx+edi*8], 2298EE00h0_2_022EEE24
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edx, word ptr [eax]0_2_022EEE24
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx ebx, byte ptr [edi+eax]0_2_022C6E19
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-000000A8h]0_2_022C7E11
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov word ptr [ebp+00h], 0000h0_2_022D6E6A
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h0_2_022D6DF8
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h0_2_022D6E80
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]0_2_022DBF04
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ecx, eax0_2_022DDF90
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp dword ptr [esi+ebp*8], B1025CF1h0_2_022ECB8F
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_022ECB8F
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then cmp al, 2Eh0_2_022D7C83
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx-57437DD5h]0_2_022ECCC9
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov ebx, edi0_2_022CEDA4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then lea eax, dword ptr [esp+18h]0_2_022D6D9E
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 4x nop then mov word ptr [eax], cx0_2_022CDDF5

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49731 -> 104.21.42.145:443
        Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49731 -> 104.21.42.145:443
        Source: Malware configuration extractorURLs: deafeninggeh.biz
        Source: Malware configuration extractorURLs: sordid-snaked.cyou
        Source: Malware configuration extractorURLs: awake-weaves.cyou
        Source: Malware configuration extractorURLs: debonairnukk.xyz
        Source: Malware configuration extractorURLs: immureprech.biz
        Source: Malware configuration extractorURLs: diffuculttan.xyz
        Source: Malware configuration extractorURLs: wrathful-jammy.cyou
        Source: Malware configuration extractorURLs: tackybrushz.click
        Source: Malware configuration extractorURLs: effecterectz.xyz
        Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
        Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49731 -> 104.21.42.145:443
        Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49732 -> 104.21.42.145:443
        Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: tackybrushz.click
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.facebook.com/sharer.php?s=100&p[title]=Get Jihosoft Free Eraser Now!&p[summary]=I downloaded this free program to wipe data from my computer securely. Worth your try.&p[url]=http://www.jihosoft.com/security/eraser.html&p[images[0]=http://www.jihosoft.com/security/eraser/free.png equals www.facebook.com (Facebook)
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.facebook.com/sharer.php?s=100&p[title]=Have a Try at Jihosoft Free Eraser!&p[summary]=Free tool to help you permanently remove any sensitive data from computer by overwriting.&p[url]=http://www.jihosoft.com/security/eraser.html&p[images[0]=http://www.jihosoft.com/security/eraser/free.png equals www.facebook.com (Facebook)
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.facebook.com/sharer.php?s=100&p[title]=Jihosoft Free Eraser&p[summary]=Free Eraser Software to Wipe Sensitive Data Permanently&p[url]=http://www.jihosoft.com/security/eraser.html&p[images[0]=http://www.jihosoft.com/security/eraser/free.png equals www.facebook.com (Facebook)
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.facebook.com/sharer.php?s=100&p[title]=Worry about Sensitive Data Reveal?&p[summary]=Get Jihosoft Free Eraser to help you permanently remove any sensitive files with ease.&p[url]=http://www.jihosoft.com/security/eraser.html&p[images[0]=http://www.jihosoft.com/security/eraser/free.png equals www.facebook.com (Facebook)
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=Ever tried Jihosoft Free Eraser? Permanently remove any sensitive data.&url=http://www.jihosoft.com/security/eraser.html&via=Jihosoft equals www.twitter.com (Twitter)
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=I strongly recommend Jihosoft Free Eraser - worth looking at.&url=http://www.jihosoft.com/security/eraser.html&via=Jihosoft equals www.twitter.com (Twitter)
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=Try Jihosoft Free Eraser. It helps me wipe sensitive data securely.&url=http://www.jihosoft.com/security/eraser.html&via=Jihosoft equals www.twitter.com (Twitter)
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=Try Jihosoft Free Eraser. It helps me wipe sensitive data securely.&url=http://www.jihosoft.com/security/eraser.html&via=JihosoftS equals www.twitter.com (Twitter)
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=if%20you%20don''t%20try%20freemake%20video%20converter%20now,%20you''ll%20hate%20yourself%20later.%20it''s%20free%20&url=http://www.freemake.com/free_video_downloader&via=Freemakecom equals www.twitter.com (Twitter)
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://www.youtube.com/watch?v=VRjRFa12TCE equals www.youtube.com (Youtube)
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://www.youtube.com/watch?v=VRjRFa12TCEOpenU equals www.youtube.com (Youtube)
        Source: global trafficDNS traffic detected: DNS query: tackybrushz.click
        Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: tackybrushz.click
        Source: 5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.freemake.com/free_video_downloader&via=Freemakecom
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/O-M/DL/DSJihoFreeEraser.php?v=2.1
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/security/eraser-comparison.html
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/security/eraser.html
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/security/eraser.html&via=Jihosoft
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/security/eraser.html&via=JihosoftS
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/security/eraser.htmlS
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/security/eraser.htmlU
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/swconfig/eraser.json
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.jihosoft.com/swconfig/eraserAD.xml
        Source: 5RRVBiCpFI.exeString found in binary or memory: http://www.sunisoft.cn
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://plus.google.com/108645709773679776162
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://plus.google.com/108645709773679776162OpenS
        Source: 5RRVBiCpFI.exe, 00000000.00000002.1843022536.00000000008D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tackybrushz.click/
        Source: 5RRVBiCpFI.exe, 00000000.00000002.1842557223.000000000084B000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000003.1841576121.00000000008D3000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000842000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tackybrushz.click/api
        Source: 5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000842000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tackybrushz.click/api9
        Source: 5RRVBiCpFI.exe, 00000000.00000002.1842557223.000000000088A000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tackybrushz.click/apiB
        Source: 5RRVBiCpFI.exe, 00000000.00000003.1841576121.00000000008D3000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000002.1843022536.00000000008D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tackybrushz.click/eK
        Source: 5RRVBiCpFI.exe, 00000000.00000003.1841576121.00000000008D3000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000002.1843022536.00000000008D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tackybrushz.click/uK
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=Ever
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=I
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=Try
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://twitter.com/intent/tweet?text=if%20you%20don
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://www.youtube.com/watch?v=VRjRFa12TCE
        Source: 5RRVBiCpFI.exeString found in binary or memory: https://www.youtube.com/watch?v=VRjRFa12TCEOpenU
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownHTTPS traffic detected: 104.21.42.145:443 -> 192.168.2.4:49731 version: TLS 1.2

        System Summary

        barindex
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022FF96C NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect,CreateThread,0_2_022FF96C
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B06670_2_022B0667
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022FF96C0_2_022FF96C
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022FC23C0_2_022FC23C
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022BB2340_2_022BB234
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DE2180_2_022DE218
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B82140_2_022B8214
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DE2690_2_022DE269
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DE25A0_2_022DE25A
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CB2A40_2_022CB2A4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022BA2C40_2_022BA2C4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022EF3640_2_022EF364
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022EB3640_2_022EB364
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E73C40_2_022E73C4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DD0300_2_022DD030
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B00000_2_022B0000
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CA0AC0_2_022CA0AC
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022EF0B40_2_022EF0B4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DF0B20_2_022DF0B2
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D20E40_2_022D20E4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DD02B0_2_022DD02B
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CF1140_2_022CF114
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022FD1140_2_022FD114
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E71640_2_022E7164
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DE17E0_2_022DE17E
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E615E0_2_022E615E
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CE1EE0_2_022CE1EE
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022FC6740_2_022FC674
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E87340_2_022E8734
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B47040_2_022B4704
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022C94740_2_022C9474
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022BC4740_2_022BC474
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022BE44B0_2_022BE44B
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B54F40_2_022B54F4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D74C40_2_022D74C4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022ED4D50_2_022ED4D5
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B75240_2_022B7524
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022C15310_2_022C1531
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CF5140_2_022CF514
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D55680_2_022D5568
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D65C10_2_022D65C1
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E2A240_2_022E2A24
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CDA790_2_022CDA79
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CFAB40_2_022CFAB4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B4AD40_2_022B4AD4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022ECB9C0_2_022ECB9C
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E5BCC0_2_022E5BCC
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022EEBD40_2_022EEBD4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CA8020_2_022CA802
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D38440_2_022D3844
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022BF8590_2_022BF859
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CF8840_2_022CF884
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D98D60_2_022D98D6
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022BD9B50_2_022BD9B5
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D99D50_2_022D99D5
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E79D40_2_022E79D4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022EA9D40_2_022EA9D4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022EEE240_2_022EEE24
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CAE0E0_2_022CAE0E
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022FBE6C0_2_022FBE6C
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B5EA40_2_022B5EA4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DAEDE0_2_022DAEDE
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022EAED40_2_022EAED4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022FAF780_2_022FAF78
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B8FE40_2_022B8FE4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D2C140_2_022D2C14
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022D0C140_2_022D0C14
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CCC150_2_022CCC15
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022C8C170_2_022C8C17
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E0C640_2_022E0C64
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DCC600_2_022DCC60
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022C8C7F0_2_022C8C7F
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B9C940_2_022B9C94
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022DCCF40_2_022DCCF4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022C2D190_2_022C2D19
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022E7D140_2_022E7D14
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022BAD640_2_022BAD64
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CEDA40_2_022CEDA4
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B7D840_2_022B7D84
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CDDF50_2_022CDDF5
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: String function: 022C5B94 appears 74 times
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: String function: 022B9AA4 appears 78 times
        Source: 5RRVBiCpFI.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/1
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B0D77 CreateToolhelp32Snapshot,Thread32First,Wow64SuspendThread,CloseHandle,0_2_022B0D77
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: 5RRVBiCpFI.exeVirustotal: Detection: 61%
        Source: 5RRVBiCpFI.exeReversingLabs: Detection: 60%
        Source: 5RRVBiCpFI.exeString found in binary or memory: <html><head><META http-equiv=Content-Type content="text/html; charset=utf-8"></head><body><!--StartFragment-->
        Source: 5RRVBiCpFI.exeString found in binary or memory: n<html><head><META http-equiv=Content-Type content="text/html; charset=utf-8"></head><body><!--StartFragment-->
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeFile read: C:\Users\user\Desktop\5RRVBiCpFI.exeJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: webio.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: 5RRVBiCpFI.exeStatic file information: File size 2369536 > 1048576
        Source: 5RRVBiCpFI.exeStatic PE information: Raw size of CODE is bigger than: 0x100000 < 0x125a00
        Source: 5RRVBiCpFI.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x101e00
        Source: 5RRVBiCpFI.exeStatic PE information: real checksum: 0x6cc007b should be: 0x24a8b0
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022EDA34 push eax; mov dword ptr [esp], 49484716h0_2_022EDA35
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022CC82A push esp; iretd 0_2_022CC833
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exe TID: 6260Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exe TID: 3616Thread sleep time: -30000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
        Source: 5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000882000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWu
        Source: 5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000842000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000882000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B0667 mov edx, dword ptr fs:[00000030h]0_2_022B0667
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B0C27 mov eax, dword ptr fs:[00000030h]0_2_022B0C27
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B1277 mov eax, dword ptr fs:[00000030h]0_2_022B1277
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B1276 mov eax, dword ptr fs:[00000030h]0_2_022B1276
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeCode function: 0_2_022B0FD7 mov eax, dword ptr fs:[00000030h]0_2_022B0FD7

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: 5RRVBiCpFI.exeString found in binary or memory: tackybrushz.click
        Source: 5RRVBiCpFI.exeString found in binary or memory: diffuculttan.xyz
        Source: 5RRVBiCpFI.exeString found in binary or memory: effecterectz.xyz
        Source: 5RRVBiCpFI.exeString found in binary or memory: deafeninggeh.biz
        Source: 5RRVBiCpFI.exeString found in binary or memory: immureprech.biz
        Source: 5RRVBiCpFI.exeString found in binary or memory: debonairnukk.xyz
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\5RRVBiCpFI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        11
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable Media2
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        PowerShell
        Logon Script (Windows)Logon Script (Windows)3
        Obfuscated Files or Information
        Security Account Manager2
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared Drive113
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        DLL Side-Loading
        NTDS22
        System Information Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        5RRVBiCpFI.exe61%VirustotalBrowse
        5RRVBiCpFI.exe61%ReversingLabsWin32.Exploit.LummaC
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.jihosoft.com/security/eraser.html&via=Jihosoft0%Avira URL Cloudsafe
        https://tackybrushz.click/api90%Avira URL Cloudsafe
        https://tackybrushz.click/uK0%Avira URL Cloudsafe
        http://www.jihosoft.com/swconfig/eraser.json0%Avira URL Cloudsafe
        http://www.jihosoft.com/security/eraser-comparison.html0%Avira URL Cloudsafe
        tackybrushz.click0%Avira URL Cloudsafe
        https://tackybrushz.click/api0%Avira URL Cloudsafe
        https://tackybrushz.click/eK0%Avira URL Cloudsafe
        http://www.jihosoft.com/security/eraser.html&via=JihosoftS0%Avira URL Cloudsafe
        http://www.sunisoft.cn0%Avira URL Cloudsafe
        http://www.jihosoft.com/security/eraser.htmlU0%Avira URL Cloudsafe
        https://tackybrushz.click/0%Avira URL Cloudsafe
        http://www.jihosoft.com/security/eraser.htmlS0%Avira URL Cloudsafe
        http://www.jihosoft.com/security/eraser.html0%Avira URL Cloudsafe
        http://www.jihosoft.com0%Avira URL Cloudsafe
        http://www.jihosoft.com/O-M/DL/DSJihoFreeEraser.php?v=2.10%Avira URL Cloudsafe
        https://tackybrushz.click/apiB0%Avira URL Cloudsafe
        http://www.jihosoft.com/swconfig/eraserAD.xml0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        tackybrushz.click
        104.21.42.145
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          sordid-snaked.cyoufalse
            high
            awake-weaves.cyoufalse
              high
              immureprech.bizfalse
                high
                deafeninggeh.bizfalse
                  high
                  https://tackybrushz.click/apitrue
                  • Avira URL Cloud: safe
                  unknown
                  debonairnukk.xyzfalse
                    high
                    diffuculttan.xyzfalse
                      high
                      effecterectz.xyzfalse
                        high
                        tackybrushz.clicktrue
                        • Avira URL Cloud: safe
                        unknown
                        wrathful-jammy.cyoufalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://www.youtube.com/watch?v=VRjRFa12TCE5RRVBiCpFI.exefalse
                            high
                            http://www.freemake.com/free_video_downloader&via=Freemakecom5RRVBiCpFI.exefalse
                              high
                              https://plus.google.com/108645709773679776162OpenS5RRVBiCpFI.exefalse
                                high
                                http://www.jihosoft.com/swconfig/eraser.json5RRVBiCpFI.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.microsoft5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000882000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jihosoft.com/security/eraser.html&via=Jihosoft5RRVBiCpFI.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://tackybrushz.click/api95RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000842000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://twitter.com/intent/tweet?text=I5RRVBiCpFI.exefalse
                                    high
                                    https://tackybrushz.click/uK5RRVBiCpFI.exe, 00000000.00000003.1841576121.00000000008D3000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000002.1843022536.00000000008D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jihosoft.com/security/eraser-comparison.html5RRVBiCpFI.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://twitter.com/intent/tweet?text=Try5RRVBiCpFI.exefalse
                                      high
                                      https://twitter.com/intent/tweet?text=Ever5RRVBiCpFI.exefalse
                                        high
                                        http://www.jihosoft.com/security/eraser.html&via=JihosoftS5RRVBiCpFI.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.sunisoft.cn5RRVBiCpFI.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://tackybrushz.click/eK5RRVBiCpFI.exe, 00000000.00000003.1841576121.00000000008D3000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000002.1843022536.00000000008D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.jihosoft.com/security/eraser.htmlU5RRVBiCpFI.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.jihosoft.com/security/eraser.htmlS5RRVBiCpFI.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://tackybrushz.click/5RRVBiCpFI.exe, 00000000.00000002.1843022536.00000000008D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://twitter.com/intent/tweet?text=if%20you%20don5RRVBiCpFI.exefalse
                                          high
                                          http://www.jihosoft.com5RRVBiCpFI.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.youtube.com/watch?v=VRjRFa12TCEOpenU5RRVBiCpFI.exefalse
                                            high
                                            http://www.jihosoft.com/O-M/DL/DSJihoFreeEraser.php?v=2.15RRVBiCpFI.exefalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.jihosoft.com/security/eraser.html5RRVBiCpFI.exefalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://tackybrushz.click/apiB5RRVBiCpFI.exe, 00000000.00000002.1842557223.000000000088A000.00000004.00000020.00020000.00000000.sdmp, 5RRVBiCpFI.exe, 00000000.00000003.1841576121.0000000000882000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://plus.google.com/1086457097736797761625RRVBiCpFI.exefalse
                                              high
                                              http://www.jihosoft.com/swconfig/eraserAD.xml5RRVBiCpFI.exefalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              104.21.42.145
                                              tackybrushz.clickUnited States
                                              13335CLOUDFLARENETUStrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1580855
                                              Start date and time:2024-12-26 12:06:06 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 3m 21s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:4
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:5RRVBiCpFI.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:7fc182ca899a18d31e703dc27449a876.exe
                                              Detection:MAL
                                              Classification:mal100.troj.evad.winEXE@1/0@1/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 100%
                                              • Number of executed functions: 8
                                              • Number of non-executed functions: 119
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Stop behavior analysis, all processes terminated
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                              • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              06:07:12API Interceptor2x Sleep call for process: 5RRVBiCpFI.exe modified
                                              No context
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              CLOUDFLARENETUSMPySEh8HaF.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.180.113
                                              Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.27.85
                                              67VB5TS184.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                              • 104.21.38.84
                                              http://booking.extranetguests.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                              • 172.67.220.52
                                              ciwa.mp4.htaGet hashmaliciousLummaC, PureLog StealerBrowse
                                              • 104.21.94.92
                                              Google Authenticator You're trying to sign in from a new location.msgGet hashmaliciousUnknownBrowse
                                              • 162.159.128.61
                                              xd.arm7.elfGet hashmaliciousMiraiBrowse
                                              • 162.159.16.108
                                              INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 172.67.177.134
                                              https://webmail.buzja.com/?auth=byoungjo.yoo@hyundaimovex.comGet hashmaliciousHTMLPhisherBrowse
                                              • 172.67.167.59
                                              Set-up.exeGet hashmaliciousLummaCBrowse
                                              • 172.67.214.186
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              a0e9f5d64349fb13191bc781f81f42e1MPySEh8HaF.exeGet hashmaliciousLummaCBrowse
                                              • 104.21.42.145
                                              Delivery form - Airway bill details - Tracking info 45821631127I ,pdf.scr.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                              • 104.21.42.145
                                              ciwa.mp4.htaGet hashmaliciousLummaC, PureLog StealerBrowse
                                              • 104.21.42.145
                                              Set-up.exeGet hashmaliciousLummaCBrowse
                                              • 104.21.42.145
                                              setup.exeGet hashmaliciousLummaCBrowse
                                              • 104.21.42.145
                                              Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                              • 104.21.42.145
                                              SET_UP.exeGet hashmaliciousLummaCBrowse
                                              • 104.21.42.145
                                              00000.ps1Get hashmaliciousLummaCBrowse
                                              • 104.21.42.145
                                              123.ps1Get hashmaliciousLummaCBrowse
                                              • 104.21.42.145
                                              No context
                                              No created / dropped files found
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):6.93943658473428
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 98.96%
                                              • InstallShield setup (43055/19) 0.43%
                                              • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                              • Win32 Executable Delphi generic (14689/80) 0.15%
                                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                              File name:5RRVBiCpFI.exe
                                              File size:2'369'536 bytes
                                              MD5:7fc182ca899a18d31e703dc27449a876
                                              SHA1:35575d85bde2dfa1668d4eca4d70d41e0b1e1736
                                              SHA256:93b56f4f608b2c3e894be0169dd92cc9012bde01568a22e4d6a44601657cb86b
                                              SHA512:b97dda59d74a5ac7d636a4c5b7fc6fd35f933d8c805f1fd22eb940203ec9c0239dc2ad338e843104368149f1afc7483a5eb5ce62cbedd165d8dc4beb6d0b9766
                                              SSDEEP:24576:EWzHNoHAwjYBAA8PdkZCiJ3yp6ZYZxlfU1g+pCpSjNCclwoll2VzJ+/SW9IqGvDw:FFAtPdkEoyQ1Rrllcz8qmMiLv
                                              TLSH:9DB59E22F242C863D46719388C4BA6B85435FE526E39AD7B37F87D1C8F366837815287
                                              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                              Icon Hash:062b614c27dc602f
                                              Entrypoint:0x5267ec
                                              Entrypoint Section:CODE
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                              DLL Characteristics:
                                              Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:1133a16cf68dab07a13253f3f67f0626
                                              Instruction
                                              push ebp
                                              mov ebp, esp
                                              add esp, FFFFFFF0h
                                              mov eax, 005261ECh
                                              call 00007F22246C7425h
                                              mov eax, dword ptr [0052C4DCh]
                                              mov eax, dword ptr [eax]
                                              call 00007F22247323ADh
                                              mov ecx, dword ptr [0052C300h]
                                              mov eax, dword ptr [0052C4DCh]
                                              mov eax, dword ptr [eax]
                                              mov edx, dword ptr [0051FA98h]
                                              call 00007F22247323ADh
                                              mov eax, dword ptr [0052C4DCh]
                                              mov eax, dword ptr [eax]
                                              call 00007F2224732421h
                                              call 00007F22246C4C24h
                                              lea eax, dword ptr [eax+00h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x12f0000x2cee.idata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1470000x101e00.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1340000x12278.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x1330000x18.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              CODE0x10000x1258340x125a00d5fe699b4b0398abb412ba25bdff82abFalse0.5005437819284803data6.590525369558882IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              DATA0x1270000x58000x58007962d3013d898cd6f11882d8bdd046f1False0.4740323153409091data5.287381992393107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              BSS0x12d0000x1a610x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .idata0x12f0000x2cee0x2e00e670e534e6f64ae8087cd6d91cd0454aFalse0.36124320652173914data5.0088263356197125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .tls0x1320000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rdata0x1330000x180x200c1d1d46389c4811f6147e35bb0ba3244False0.05078125MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "S"0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                              .reloc0x1340000x122780x1240073052c4011dc9054a85f5d232b05075cFalse0.5440122003424658data6.655570258331296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                              .rsrc0x1470000x101e000x101e00ed4426e780d76a69a414cba1a66ade18False0.48206211373000485data6.9453030538277165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_CURSOR0x14cb340x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                              RT_CURSOR0x14cc680x134data0.4642857142857143
                                              RT_CURSOR0x14cd9c0x134data0.4805194805194805
                                              RT_CURSOR0x14ced00x134data0.38311688311688313
                                              RT_CURSOR0x14d0040x134data0.36038961038961037
                                              RT_CURSOR0x14d1380x134data0.4090909090909091
                                              RT_CURSOR0x14d26c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                              RT_CURSOR0x14d3a00x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.19385026737967914
                                              RT_CURSOR0x14d68c0x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.18716577540106952
                                              RT_CURSOR0x14d9780x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.2179144385026738
                                              RT_CURSOR0x14dc640x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.21122994652406418
                                              RT_CURSOR0x14df500x134AmigaOS bitmap font "(", fc_YSize 4294967064, 3584 elements, 2nd "\377\270w\377\377\370\177\377\377\370\177\377\377\370\177\377\377\370\177\377\377\370\177\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdGermanGermany0.32792207792207795
                                              RT_CURSOR0x14e0840x134Targa image data 64 x 65536 x 1 +32 "\001"GermanGermany0.5292207792207793
                                              RT_CURSOR0x14e1b80x134Targa image data 64 x 65536 x 1 +32 "\001"0.3538961038961039
                                              RT_CURSOR0x14e2ec0x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.18983957219251338
                                              RT_CURSOR0x14e5d80x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.19117647058823528
                                              RT_CURSOR0x14e8c40x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.19786096256684493
                                              RT_CURSOR0x14ebb00x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.18983957219251338
                                              RT_CURSOR0x14ee9c0x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.19518716577540107
                                              RT_CURSOR0x14f1880x2ecTarga image data 64 x 65536 x 1 +32 "\004"GermanGermany0.19518716577540107
                                              RT_BITMAP0x14f4740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                              RT_BITMAP0x14f6440x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                                              RT_BITMAP0x14f8280x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                              RT_BITMAP0x14f9f80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                                              RT_BITMAP0x14fbc80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                                              RT_BITMAP0x14fd980x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                                              RT_BITMAP0x14ff680x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                              RT_BITMAP0x1501380x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                              RT_BITMAP0x1503080x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                              RT_BITMAP0x1504d80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                              RT_BITMAP0x1506a80x1ca0Device independent bitmap graphic, 231 x 27 x 8, image size 6264ChineseChina0.11544759825327511
                                              RT_BITMAP0x1523480x1d4Device independent bitmap graphic, 52 x 13 x 4, image size 364ChineseChina0.3141025641025641
                                              RT_BITMAP0x15251c0x170Device independent bitmap graphic, 44 x 11 x 4, image size 264ChineseChina0.39402173913043476
                                              RT_BITMAP0x15268c0x450Device independent bitmap graphic, 1 x 10 x 8, image size 40ChineseChina0.09148550724637682
                                              RT_BITMAP0x152adc0x1d4Device independent bitmap graphic, 52 x 13 x 4, image size 364ChineseChina0.43803418803418803
                                              RT_BITMAP0x152cb00x3a8Device independent bitmap graphic, 102 x 16 x 4, image size 832ChineseChina0.3557692307692308
                                              RT_BITMAP0x1530580x5a8Device independent bitmap graphic, 21 x 16 x 8, image size 384ChineseChina0.42472375690607733
                                              RT_BITMAP0x1536000xbcDevice independent bitmap graphic, 1 x 21 x 4, image size 84ChineseChina0.5851063829787234
                                              RT_BITMAP0x1536bc0x6d8Device independent bitmap graphic, 8 x 86 x 8, image size 688ChineseChina0.4001141552511416
                                              RT_BITMAP0x153d940x134Device independent bitmap graphic, 18 x 17 x 4, image size 204ChineseChina0.4512987012987013
                                              RT_BITMAP0x153ec80x90Device independent bitmap graphic, 10 x 5 x 4, image size 40ChineseChina0.6736111111111112
                                              RT_BITMAP0x153f580xd2cDevice independent bitmap graphic, 342 x 19 x 4, image size 3268ChineseChina0.14383155397390274
                                              RT_BITMAP0x154c840x1b5cDevice independent bitmap graphic, 179 x 33 x 8, image size 5940ChineseChina0.23557966876070816
                                              RT_BITMAP0x1567e00x194cDevice independent bitmap graphic, 162 x 33 x 8, image size 5412ChineseChina0.2652872143298332
                                              RT_BITMAP0x15812c0x1190Device independent bitmap graphic, 101 x 33 x 8, image size 3432ChineseChina0.18683274021352314
                                              RT_BITMAP0x1592bc0x24aDevice independent bitmap graphic, 45 x 4 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.10580204778156997
                                              RT_BITMAP0x1595080x2faDevice independent bitmap graphic, 11 x 20 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.32545931758530183
                                              RT_BITMAP0x1598040x2feDevice independent bitmap graphic, 18 x 11 x 8, image size 0, resolution 2834 x 2834 px/m, 126 important colorsChineseChina0.8733681462140992
                                              RT_BITMAP0x159b040xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5208333333333334
                                              RT_BITMAP0x159bc40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42857142857142855
                                              RT_BITMAP0x159ca40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.4955357142857143
                                              RT_BITMAP0x159d840x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.391304347826087
                                              RT_BITMAP0x159de00x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.532608695652174
                                              RT_BITMAP0x159e3c0x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.4782608695652174
                                              RT_BITMAP0x159e980x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.5543478260869565
                                              RT_BITMAP0x159ef40x5cDevice independent bitmap graphic, 6 x 11 x 1, image size 440.4673913043478261
                                              RT_BITMAP0x159f500xe28Device independent bitmap graphic, 160 x 16 x 8, image size 2560ChineseChina0.467439293598234
                                              RT_BITMAP0x15ad780x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.41025641025641024
                                              RT_BITMAP0x15aeb00x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.27564102564102566
                                              RT_BITMAP0x15afe80x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.3685897435897436
                                              RT_BITMAP0x15b1200x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.3685897435897436
                                              RT_BITMAP0x15b2580x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.34294871794871795
                                              RT_BITMAP0x15b3900x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.3717948717948718
                                              RT_BITMAP0x15b4c80x104Device independent bitmap graphic, 20 x 13 x 4, image size 1560.5038461538461538
                                              RT_BITMAP0x15b5cc0x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.4326923076923077
                                              RT_BITMAP0x15b7040x104Device independent bitmap graphic, 20 x 13 x 4, image size 1560.5153846153846153
                                              RT_BITMAP0x15b8080x138Device independent bitmap graphic, 28 x 13 x 4, image size 2080.46474358974358976
                                              RT_BITMAP0x15b9400x998Device independent bitmap graphic, 222 x 21 x 4, image size 2352ChineseChina0.05578175895765472
                                              RT_BITMAP0x15c2d80x1d4Device independent bitmap graphic, 52 x 13 x 4, image size 364ChineseChina0.23931623931623933
                                              RT_BITMAP0x15c4ac0x170Device independent bitmap graphic, 44 x 11 x 4, image size 264ChineseChina0.29891304347826086
                                              RT_BITMAP0x15c61c0x450Device independent bitmap graphic, 1 x 10 x 8, image size 40ChineseChina0.04528985507246377
                                              RT_BITMAP0x15ca6c0x1d4Device independent bitmap graphic, 52 x 13 x 4, image size 364ChineseChina0.3974358974358974
                                              RT_BITMAP0x15cc400x368Device independent bitmap graphic, 96 x 16 x 4, image size 768ChineseChina0.2018348623853211
                                              RT_BITMAP0x15cfa80x128Device independent bitmap graphic, 21 x 16 x 4, image size 192ChineseChina0.32432432432432434
                                              RT_BITMAP0x15d0d00xb8Device independent bitmap graphic, 1 x 20 x 4, image size 80ChineseChina0.5108695652173914
                                              RT_BITMAP0x15d1880x1b4Device independent bitmap graphic, 8 x 83 x 4, image size 332ChineseChina0.26605504587155965
                                              RT_BITMAP0x15d33c0xf0Device independent bitmap graphic, 12 x 17 x 4, image size 136ChineseChina0.3625
                                              RT_BITMAP0x15d42c0x7cDevice independent bitmap graphic, 5 x 5 x 4, image size 20ChineseChina0.6774193548387096
                                              RT_BITMAP0x15d4a80xd2cDevice independent bitmap graphic, 342 x 19 x 4, image size 3268ChineseChina0.13997627520759193
                                              RT_BITMAP0x15e1d40x6e8Device independent bitmap graphic, 98 x 32 x 4, image size 1664ChineseChina0.07239819004524888
                                              RT_BITMAP0x15e8bc0x10a8Device independent bitmap graphic, 97 x 32 x 8, image size 3200ChineseChina0.024859287054409006
                                              RT_BITMAP0x15f9640x10a8Device independent bitmap graphic, 97 x 32 x 8, image size 3200ChineseChina0.03541275797373358
                                              RT_BITMAP0x160a0c0x24aDevice independent bitmap graphic, 45 x 4 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.10580204778156997
                                              RT_BITMAP0x160c580x2faDevice independent bitmap graphic, 11 x 20 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.16272965879265092
                                              RT_BITMAP0x160f540x1caDevice independent bitmap graphic, 18 x 11 x 8, image size 0, resolution 2834 x 2834 px/m, 49 important colorsChineseChina0.6375545851528385
                                              RT_BITMAP0x1611200xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.38392857142857145
                                              RT_BITMAP0x1612000xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4947916666666667
                                              RT_BITMAP0x1612c00xf8Device independent bitmap graphic, 20 x 12 x 4, image size 144, 16 important colorsChineseChina0.41935483870967744
                                              RT_BITMAP0x1613b80xf8Device independent bitmap graphic, 20 x 12 x 4, image size 144, 16 important colorsChineseChina0.43548387096774194
                                              RT_BITMAP0x1614b00xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.484375
                                              RT_BITMAP0x1615700xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42410714285714285
                                              RT_BITMAP0x1616500x1accDevice independent bitmap graphic, 252 x 23 x 8, image size 5796ChineseChina0.3043731778425656
                                              RT_BITMAP0x16311c0x824Device independent bitmap graphic, 60 x 17 x 8, image size 1020ChineseChina0.7720729366602687
                                              RT_BITMAP0x1639400x5e0Device independent bitmap graphic, 40 x 11 x 8, image size 440ChineseChina0.8829787234042553
                                              RT_BITMAP0x163f200x538Device independent bitmap graphic, 16 x 17 x 8, image size 272ChineseChina0.7664670658682635
                                              RT_BITMAP0x1644580x88Device independent bitmap graphic, 8 x 8 x 4, image size 32ChineseChina0.5294117647058824
                                              RT_BITMAP0x1644e00xc0Device independent bitmap graphic, 1 x 22 x 4, image size 88, 16 important colorsChineseChina0.6145833333333334
                                              RT_BITMAP0x1645a00x47cDevice independent bitmap graphic, 1 x 21 x 8, image size 84ChineseChina0.5296167247386759
                                              RT_BITMAP0x164a1c0x4c8Device independent bitmap graphic, 13 x 10 x 8, image size 160ChineseChina0.7181372549019608
                                              RT_BITMAP0x164ee40x868Device independent bitmap graphic, 64 x 17 x 8, image size 1088ChineseChina0.7523234200743495
                                              RT_BITMAP0x16574c0xc68Device independent bitmap graphic, 96 x 22 x 8, image size 2112ChineseChina0.46788413098236775
                                              RT_BITMAP0x1663b40x668Device independent bitmap graphic, 33 x 16 x 8, image size 576ChineseChina0.802439024390244
                                              RT_BITMAP0x166a1c0x938Device independent bitmap graphic, 72 x 18 x 8, image size 1296ChineseChina0.601271186440678
                                              RT_BITMAP0x1673540x47cDevice independent bitmap graphic, 1 x 21 x 8, image size 84ChineseChina0.5174216027874564
                                              RT_BITMAP0x1677d00x6c8Device independent bitmap graphic, 7 x 84 x 8, image size 672ChineseChina0.41013824884792627
                                              RT_BITMAP0x167e980x7f4Device independent bitmap graphic, 36 x 27 x 8, image size 972ChineseChina0.631139489194499
                                              RT_BITMAP0x16868c0x4b4Device independent bitmap graphic, 17 x 7 x 8, image size 140ChineseChina0.5191029900332226
                                              RT_BITMAP0x168b400x3d42Device independent bitmap graphic, 306 x 17 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.12230582833822216
                                              RT_BITMAP0x16c8840x8d4Device independent bitmap graphic, 49 x 23 x 8, image size 1196, 256 important colorsChineseChina0.3168141592920354
                                              RT_BITMAP0x16d1580x878Device independent bitmap graphic, 48 x 23 x 8, image size 1104, 256 important colorsChineseChina0.16512915129151293
                                              RT_BITMAP0x16d9d00x878Device independent bitmap graphic, 48 x 23 x 8, image size 1104, 256 important colorsChineseChina0.37084870848708484
                                              RT_BITMAP0x16e2480x2d2Device independent bitmap graphic, 45 x 5 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.15650969529085873
                                              RT_BITMAP0x16e51c0x2faDevice independent bitmap graphic, 11 x 20 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.473753280839895
                                              RT_BITMAP0x16e8180x25aDevice independent bitmap graphic, 19 x 11 x 8, image size 0, resolution 2834 x 2834 px/m, 85 important colorsChineseChina0.8471760797342193
                                              RT_BITMAP0x16ea740xb0Device independent bitmap graphic, 48 x 16 x 1, image size 128ChineseChina0.42045454545454547
                                              RT_BITMAP0x16eb240xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colorsChineseChina0.4353448275862069
                                              RT_BITMAP0x16ec0c0x2ccDevice independent bitmap graphic, 72 x 17 x 4, image size 612ChineseChina0.25139664804469275
                                              RT_BITMAP0x16eed80x1fb8Device independent bitmap graphic, 168 x 42 x 8, image size 7056ChineseChina0.3619458128078818
                                              RT_BITMAP0x170e900xf6aaDevice independent bitmap graphic, 181 x 116 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.021379026383302187
                                              RT_BITMAP0x18053c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5104166666666666
                                              RT_BITMAP0x1805fc0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.5
                                              RT_BITMAP0x1806dc0x1b8Device independent bitmap graphic, 52 x 12 x 4, image size 336ChineseChina0.3795454545454545
                                              RT_BITMAP0x1808940xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                                              RT_BITMAP0x18097c0x1688Device independent bitmap graphic, 222 x 21 x 8, image size 4704ChineseChina0.4433079056865465
                                              RT_BITMAP0x1820040x1d4Device independent bitmap graphic, 52 x 13 x 4, image size 364ChineseChina0.21794871794871795
                                              RT_BITMAP0x1821d80x170Device independent bitmap graphic, 44 x 11 x 4, image size 264ChineseChina0.27445652173913043
                                              RT_BITMAP0x1823480x88Device independent bitmap graphic, 8 x 8 x 4, image size 32ChineseChina0.6323529411764706
                                              RT_BITMAP0x1823d00x450Device independent bitmap graphic, 1 x 10 x 8, image size 40ChineseChina0.03894927536231884
                                              RT_BITMAP0x1828200x1d4Device independent bitmap graphic, 52 x 13 x 4, image size 364ChineseChina0.3803418803418803
                                              RT_BITMAP0x1829f40xa28Device independent bitmap graphic, 96 x 16 x 8, image size 1536ChineseChina0.5411538461538462
                                              RT_BITMAP0x18341c0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192ChineseChina0.32432432432432434
                                              RT_BITMAP0x1835440xbcDevice independent bitmap graphic, 1 x 21 x 4, image size 84ChineseChina0.6542553191489362
                                              RT_BITMAP0x1836000x1b4Device independent bitmap graphic, 8 x 83 x 4, image size 332ChineseChina0.26376146788990823
                                              RT_BITMAP0x1837b40x134Device independent bitmap graphic, 18 x 17 x 4, image size 204ChineseChina0.3961038961038961
                                              RT_BITMAP0x1838e80x90Device independent bitmap graphic, 10 x 5 x 4, image size 40ChineseChina0.7013888888888888
                                              RT_BITMAP0x1839780xd2cDevice independent bitmap graphic, 342 x 19 x 4, image size 3268ChineseChina0.14323843416370108
                                              RT_BITMAP0x1846a40xc4Device independent bitmap graphic, 1 x 23 x 4, image size 92ChineseChina0.4744897959183674
                                              RT_BITMAP0x1847680x2c0cDevice independent bitmap graphic, 441 x 23 x 8, image size 10212ChineseChina0.33806314295849593
                                              RT_BITMAP0x1873740x484Device independent bitmap graphic, 1 x 23 x 8, image size 92ChineseChina0.092560553633218
                                              RT_BITMAP0x1877f80x24aDevice independent bitmap graphic, 45 x 4 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.10238907849829351
                                              RT_BITMAP0x187a440x2faDevice independent bitmap graphic, 11 x 20 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.3753280839895013
                                              RT_BITMAP0x187d400x282Device independent bitmap graphic, 18 x 11 x 8, image size 0, resolution 2834 x 2834 px/m, 95 important colorsChineseChina0.764797507788162
                                              RT_BITMAP0x187fc40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4895833333333333
                                              RT_BITMAP0x1880840x54Device independent bitmap graphic, 7 x 9 x 1, image size 36ChineseChina0.47619047619047616
                                              RT_BITMAP0x1880d80xc0Device independent bitmap graphic, 11 x 11 x 4, image size 88ChineseChina0.4583333333333333
                                              RT_BITMAP0x1881980x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4115853658536585
                                              RT_BITMAP0x1888000x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4792682926829268
                                              RT_BITMAP0x188e680x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4036585365853659
                                              RT_BITMAP0x1894d00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4274390243902439
                                              RT_BITMAP0x189b380x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.39695121951219514
                                              RT_BITMAP0x18a1a00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.41280487804878047
                                              RT_BITMAP0x18a8080x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4451219512195122
                                              RT_BITMAP0x18ae700x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.40426829268292686
                                              RT_BITMAP0x18b4d80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4219512195121951
                                              RT_BITMAP0x18bb400x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4798780487804878
                                              RT_BITMAP0x18c1a80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.46402439024390246
                                              RT_BITMAP0x18c8100x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4603658536585366
                                              RT_BITMAP0x18ce780x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.5025510204081632
                                              RT_BITMAP0x18d0000x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4634146341463415
                                              RT_BITMAP0x18d6680x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4628048780487805
                                              RT_BITMAP0x18dcd00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4676829268292683
                                              RT_BITMAP0x18e3380x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.46402439024390246
                                              RT_BITMAP0x18e9a00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4554878048780488
                                              RT_BITMAP0x18f0080x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.5920731707317073
                                              RT_BITMAP0x18f6700x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.46158536585365856
                                              RT_BITMAP0x18fcd80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4195121951219512
                                              RT_BITMAP0x1903400x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.4770408163265306
                                              RT_BITMAP0x1904c80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4609756097560976
                                              RT_BITMAP0x190b300x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.401219512195122
                                              RT_BITMAP0x1911980x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4189024390243902
                                              RT_BITMAP0x1918000x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.47317073170731705
                                              RT_BITMAP0x191e680x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4164634146341463
                                              RT_BITMAP0x1924d00x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.47959183673469385
                                              RT_BITMAP0x1926580x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.4872448979591837
                                              RT_BITMAP0x1927e00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.39207317073170733
                                              RT_BITMAP0x192e480x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.39695121951219514
                                              RT_BITMAP0x1934b00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.44085365853658537
                                              RT_BITMAP0x193b180x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.40792682926829266
                                              RT_BITMAP0x1941800x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.3979591836734694
                                              RT_BITMAP0x1943080x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.40853658536585363
                                              RT_BITMAP0x1949700x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4067073170731707
                                              RT_BITMAP0x194fd80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.41097560975609754
                                              RT_BITMAP0x1956400x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.43841463414634146
                                              RT_BITMAP0x195ca80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4445121951219512
                                              RT_BITMAP0x1963100x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.39390243902439026
                                              RT_BITMAP0x1969780x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.44387755102040816
                                              RT_BITMAP0x196b000x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4445121951219512
                                              RT_BITMAP0x1971680x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4054878048780488
                                              RT_BITMAP0x1977d00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4451219512195122
                                              RT_BITMAP0x197e380x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4292682926829268
                                              RT_BITMAP0x1984a00x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.413265306122449
                                              RT_BITMAP0x1986280x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.41829268292682925
                                              RT_BITMAP0x198c900x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4036585365853659
                                              RT_BITMAP0x1992f80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4140243902439024
                                              RT_BITMAP0x1999600x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.39878048780487807
                                              RT_BITMAP0x199fc80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4140243902439024
                                              RT_BITMAP0x19a6300x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.40182926829268295
                                              RT_BITMAP0x19ac980x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.41097560975609754
                                              RT_BITMAP0x19b3000x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4073170731707317
                                              RT_BITMAP0x19b9680x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.41097560975609754
                                              RT_BITMAP0x19bfd00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4371951219512195
                                              RT_BITMAP0x19c6380x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.4642857142857143
                                              RT_BITMAP0x19c7c00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.43414634146341463
                                              RT_BITMAP0x19ce280x188Device independent bitmap graphic, 24 x 24 x 4, image size 288ChineseChina0.4719387755102041
                                              RT_BITMAP0x19cfb00x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4054878048780488
                                              RT_BITMAP0x19d6180x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4451219512195122
                                              RT_BITMAP0x19dc800x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.45914634146341465
                                              RT_BITMAP0x19e2e80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.40426829268292686
                                              RT_BITMAP0x19e9500x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4329268292682927
                                              RT_BITMAP0x19efb80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576ChineseChina0.4073170731707317
                                              RT_BITMAP0x19f6200xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.3794642857142857
                                              RT_BITMAP0x19f7000xce8Device independent bitmap graphic, 400 x 16 x 4, image size 32000.1089588377723971
                                              RT_BITMAP0x1a03e80xce8Device independent bitmap graphic, 400 x 16 x 4, image size 32000.10714285714285714
                                              RT_BITMAP0x1a10d00xce8Device independent bitmap graphic, 400 x 16 x 4, image size 32000.0950363196125908
                                              RT_BITMAP0x1a1db80x268Device independent bitmap graphic, 32 x 32 x 4, image size 5120.21266233766233766
                                              RT_BITMAP0x1a20200x268Device independent bitmap graphic, 32 x 32 x 4, image size 5120.17207792207792208
                                              RT_BITMAP0x1a22880x268Device independent bitmap graphic, 32 x 32 x 4, image size 5120.1672077922077922
                                              RT_BITMAP0x1a24f00xce8Device independent bitmap graphic, 400 x 16 x 4, image size 32000.11955205811138014
                                              RT_BITMAP0x1a31d80xce8Device independent bitmap graphic, 400 x 16 x 4, image size 32000.11561743341404358
                                              RT_BITMAP0x1a3ec00xd28Device independent bitmap graphic, 144 x 16 x 8, image size 23040.23634204275534443
                                              RT_BITMAP0x1a4be80x4b2aDevice independent bitmap graphic, 400 x 16 x 24, image size 0, resolution 2834 x 2834 px/m0.2749194470429269
                                              RT_BITMAP0x1a97140x126Device independent bitmap graphic, 9 x 9 x 24, image size 0, resolution 2834 x 2834 px/m0.5850340136054422
                                              RT_BITMAP0x1a983c0x126Device independent bitmap graphic, 9 x 9 x 24, image size 0, resolution 2834 x 2834 px/m0.5918367346938775
                                              RT_BITMAP0x1a99640x8c0Device independent bitmap graphic, 54 x 21 x 8, image size 1176ChineseChina0.40714285714285714
                                              RT_BITMAP0x1aa2240x6ccDevice independent bitmap graphic, 52 x 13 x 8, image size 676ChineseChina0.5103448275862069
                                              RT_BITMAP0x1aa8f00x170Device independent bitmap graphic, 44 x 11 x 4, image size 264ChineseChina0.5869565217391305
                                              RT_BITMAP0x1aaa600x548Device independent bitmap graphic, 16 x 18 x 8, image size 288ChineseChina0.525887573964497
                                              RT_BITMAP0x1aafa80x478Device independent bitmap graphic, 6 x 10 x 8, image size 80ChineseChina0.541083916083916
                                              RT_BITMAP0x1ab4200x6ccDevice independent bitmap graphic, 52 x 13 x 8, image size 676ChineseChina0.6752873563218391
                                              RT_BITMAP0x1abaec0xa88Device independent bitmap graphic, 96 x 17 x 8, image size 1632ChineseChina0.5459940652818991
                                              RT_BITMAP0x1ac5740x5a8Device independent bitmap graphic, 21 x 16 x 8, image size 384ChineseChina0.56146408839779
                                              RT_BITMAP0x1acb1c0x938Device independent bitmap graphic, 72 x 18 x 8, image size 1296ChineseChina0.5199152542372881
                                              RT_BITMAP0x1ad4540x47cDevice independent bitmap graphic, 1 x 21 x 8, image size 84ChineseChina0.519163763066202
                                              RT_BITMAP0x1ad8d00x6d8Device independent bitmap graphic, 8 x 86 x 8, image size 688ChineseChina0.375
                                              RT_BITMAP0x1adfa80x590Device independent bitmap graphic, 18 x 18 x 8, image size 360ChineseChina0.4978932584269663
                                              RT_BITMAP0x1ae5380x6cDevice independent bitmap graphic, 8 x 1 x 4, image size 4ChineseChina0.7314814814814815
                                              RT_BITMAP0x1ae5a40x5d5aDevice independent bitmap graphic, 378 x 21 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.17557954640555695
                                              RT_BITMAP0x1b43000x50eDevice independent bitmap graphic, 37 x 29 x 8, image size 0, resolution 2834 x 2834 px/m, 23 important colorsChineseChina0.15301391035548687
                                              RT_BITMAP0x1b48100x83cDevice independent bitmap graphic, 35 x 29 x 8, image size 1044ChineseChina0.4620493358633776
                                              RT_BITMAP0x1b504c0x83cDevice independent bitmap graphic, 35 x 29 x 8, image size 1044ChineseChina0.5028462998102466
                                              RT_BITMAP0x1b58880x46aDevice independent bitmap graphic, 45 x 8 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.08053097345132744
                                              RT_BITMAP0x1b5cf40x31eDevice independent bitmap graphic, 11 x 21 x 24, image size 0, resolution 2834 x 2834 px/mChineseChina0.30451127819548873
                                              RT_BITMAP0x1b60140x1e2Device independent bitmap graphic, 22 x 11 x 8, image size 0, resolution 2834 x 2834 px/m, 44 important colorsChineseChina0.6244813278008299
                                              RT_ICON0x1b61f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.6587837837837838
                                              RT_ICON0x1b63200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.5658315565031983
                                              RT_ICON0x1b71c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.7197653429602888
                                              RT_ICON0x1b7a700x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.3684971098265896
                                              RT_ICON0x1b7fd80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.38884123979652196
                                              RT_ICON0x1c88000x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016ChineseChina0.4819739331511457
                                              RT_ICON0x1d1ca80x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560ChineseChina0.4575563909774436
                                              RT_ICON0x1d84900x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600ChineseChina0.5074399260628466
                                              RT_ICON0x1dd9180x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.5247992442135097
                                              RT_ICON0x1e1b400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.5431535269709543
                                              RT_ICON0x1e40e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.6357879924953096
                                              RT_ICON0x1e51900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.6979508196721311
                                              RT_ICON0x1e5b180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.46099290780141844
                                              RT_DIALOG0x1e5f800x52data0.7682926829268293
                                              RT_STRING0x1e5fd40x144dataChineseChina0.5771604938271605
                                              RT_STRING0x1e61180x1b0dataChineseChina0.4375
                                              RT_STRING0x1e62c80xc4dataChineseChina0.6785714285714286
                                              RT_STRING0x1e638c0x2adataChineseChina0.5
                                              RT_STRING0x1e63b80xadcdata0.26187050359712233
                                              RT_STRING0x1e6e940x6a4data0.32235294117647056
                                              RT_STRING0x1e75380x3f4data0.39723320158102765
                                              RT_STRING0x1e792c0x384data0.3811111111111111
                                              RT_STRING0x1e7cb00x408data0.3943798449612403
                                              RT_STRING0x1e80b80x3b8data0.3329831932773109
                                              RT_STRING0x1e84700x36cdata0.4132420091324201
                                              RT_STRING0x1e87dc0x2c0data0.4275568181818182
                                              RT_STRING0x1e8a9c0x534data0.3918918918918919
                                              RT_STRING0x1e8fd00x354data0.3955399061032864
                                              RT_STRING0x1e93240x290data0.5442073170731707
                                              RT_STRING0x1e95b40x1d0data0.38146551724137934
                                              RT_STRING0x1e97840x16cdata0.532967032967033
                                              RT_STRING0x1e98f00x1e4Targa image data - Color 99 x 107 x 32 +68 +111 "z"0.5041322314049587
                                              RT_STRING0x1e9ad40x260data0.49835526315789475
                                              RT_STRING0x1e9d340xe8data0.5905172413793104
                                              RT_STRING0x1e9e1c0x128data0.5574324324324325
                                              RT_STRING0x1e9f440x2c8data0.45786516853932585
                                              RT_STRING0x1ea20c0x420data0.39204545454545453
                                              RT_STRING0x1ea62c0x388data0.39491150442477874
                                              RT_STRING0x1ea9b40x3acdata0.33085106382978724
                                              RT_STRING0x1ead600x334data0.4317073170731707
                                              RT_STRING0x1eb0940xd8data0.5648148148148148
                                              RT_STRING0x1eb16c0xbcdata0.5425531914893617
                                              RT_STRING0x1eb2280x3ccdata0.3765432098765432
                                              RT_STRING0x1eb5f40x46cdata0.3215547703180212
                                              RT_STRING0x1eba600x334data0.3719512195121951
                                              RT_STRING0x1ebd940x310data0.36989795918367346
                                              RT_RCDATA0x1ec0a40x10data1.5
                                              RT_RCDATA0x1ec0b40x934data0.6137521222410866
                                              RT_RCDATA0x1ec9e80x79dDelphi compiled form 'TFrmEraserMessage'0.39148281169830684
                                              RT_RCDATA0x1ed1880x3baDelphi compiled form 'TFrmLoad'0.519916142557652
                                              RT_RCDATA0x1ed5440x6a6Delphi compiled form 'TFrmMessage'0.41245593419506466
                                              RT_RCDATA0x1edbec0x2bcDelphi compiled form 'TfrmMgr'0.6114285714285714
                                              RT_RCDATA0x1edea80x306Delphi compiled form 'TfrmMSNPopForm'0.5943152454780362
                                              RT_RCDATA0x1ee1b00x7f1Delphi compiled form 'TFrmReg'0.3694048204623709
                                              RT_RCDATA0x1ee9a40x494Delphi compiled form 'TLoginDialog'0.4931740614334471
                                              RT_RCDATA0x1eee380x8b55Delphi compiled form 'TMainFrm'0.16154083377722953
                                              RT_RCDATA0x1f79900x3c4Delphi compiled form 'TPasswordDialog'0.4678423236514523
                                              RT_GROUP_CURSOR0x1f7d540x14data1.4
                                              RT_GROUP_CURSOR0x1f7d680x14data1.4
                                              RT_GROUP_CURSOR0x1f7d7c0x14data1.4
                                              RT_GROUP_CURSOR0x1f7d900x14data1.4
                                              RT_GROUP_CURSOR0x1f7da40x14data1.4
                                              RT_GROUP_CURSOR0x1f7db80x14data1.4
                                              RT_GROUP_CURSOR0x1f7dcc0x14data1.4
                                              RT_GROUP_CURSOR0x1f7de00x14data1.4
                                              RT_GROUP_CURSOR0x1f7df40x14data1.4
                                              RT_GROUP_CURSOR0x1f7e080x14data1.4
                                              RT_GROUP_CURSOR0x1f7e1c0x14data1.4
                                              RT_GROUP_CURSOR0x1f7e300x14data1.4
                                              RT_GROUP_CURSOR0x1f7e440x14Lotus unknown worksheet or configuration, revision 0x11.25
                                              RT_GROUP_CURSOR0x1f7e580x14Lotus unknown worksheet or configuration, revision 0x11.25
                                              RT_GROUP_CURSOR0x1f7e6c0x14Lotus unknown worksheet or configuration, revision 0x11.25
                                              RT_GROUP_CURSOR0x1f7e800x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x1f7e940x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x1f7ea80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x1f7ebc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_CURSOR0x1f7ed00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                              RT_GROUP_ICON0x1f7ee40xbcdataChineseChina0.6702127659574468
                                              DLLImport
                                              kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                              user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                              oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                              kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                              advapi32.dllRegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExA, RegFlushKey, RegEnumKeyExA, RegCreateKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA, GetUserNameA, AdjustTokenPrivileges
                                              kernel32.dlllstrlenW, lstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVolumeInformationA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetTempPathA, GetSystemInfo, GetSystemDirectoryA, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentProcess, GetComputerNameA, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CreateDirectoryA, CopyFileA, CompareStringA, CloseHandle
                                              version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                              gdi32.dllUnrealizeObject, TextOutW, StretchDIBits, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PathToRegion, PatBlt, OffsetRgn, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetViewportOrgEx, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32W, GetTextExtentPoint32A, GetTextColor, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetNearestPaletteIndex, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetCurrentObject, GetClipBox, GetBrushOrgEx, GetBkColor, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, EndPath, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRoundRectRgn, CreateRectRgnIndirect, CreateRectRgn, CreatePenIndirect, CreatePatternBrush, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, CloseFigure, BitBlt, BeginPath, Arc
                                              user32.dllCreateWindowExA, WindowFromPoint, WindowFromDC, WinHelpA, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, ToAscii, SystemParametersInfoA, SubtractRect, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowRgn, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScrollDC, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, NotifyWinEvent, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LockWindowUpdate, LoadStringA, LoadKeyboardLayoutA, LoadImageA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardFormatNameA, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, ExitWindowsEx, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EndDeferWindowPos, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextW, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DeferWindowPos, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CopyImage, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, BeginDeferWindowPos, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                              ole32.dllCoTaskMemFree, StringFromCLSID, CoCreateGuid
                                              kernel32.dllSleep
                                              oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                              ole32.dllCreateStreamOnHGlobal, ReleaseStgMedium, OleGetClipboard, OleSetClipboard, DoDragDrop, RevokeDragDrop, RegisterDragDrop, OleUninitialize, OleInitialize, CreateDataAdviseHolder, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize
                                              oleaut32.dllCreateErrorInfo, GetErrorInfo, SetErrorInfo, SysFreeString
                                              comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                              shell32.dllShellExecuteA
                                              shell32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHGetMalloc, SHGetDesktopFolder, SHBrowseForFolderA
                                              comdlg32.dllGetSaveFileNameA, GetOpenFileNameA
                                              winmm.dlltimeGetTime, timeEndPeriod, timeBeginPeriod
                                              GDI32.DLLGetRandomRgn
                                              Language of compilation systemCountry where language is spokenMap
                                              GermanGermany
                                              ChineseChina
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-12-26T12:07:12.528493+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449731104.21.42.145443TCP
                                              2024-12-26T12:07:13.448413+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449731104.21.42.145443TCP
                                              2024-12-26T12:07:13.448413+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449731104.21.42.145443TCP
                                              2024-12-26T12:07:14.827336+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449732104.21.42.145443TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 26, 2024 12:07:11.180000067 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:11.180075884 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:11.180171967 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:11.219172955 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:11.219188929 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:12.528358936 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:12.528492928 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:12.530764103 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:12.530771017 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:12.531164885 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:12.577006102 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:12.674233913 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:12.676109076 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:12.676136017 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:13.448443890 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:13.448599100 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:13.448668957 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:13.470515966 CET49731443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:13.470547915 CET44349731104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:13.543549061 CET49732443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:13.543600082 CET44349732104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:13.543667078 CET49732443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:13.543958902 CET49732443192.168.2.4104.21.42.145
                                              Dec 26, 2024 12:07:13.543972969 CET44349732104.21.42.145192.168.2.4
                                              Dec 26, 2024 12:07:14.827336073 CET49732443192.168.2.4104.21.42.145
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 26, 2024 12:07:10.849065065 CET5774753192.168.2.41.1.1.1
                                              Dec 26, 2024 12:07:11.174725056 CET53577471.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 26, 2024 12:07:10.849065065 CET192.168.2.41.1.1.10xbf21Standard query (0)tackybrushz.clickA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 26, 2024 12:07:11.174725056 CET1.1.1.1192.168.2.40xbf21No error (0)tackybrushz.click104.21.42.145A (IP address)IN (0x0001)false
                                              Dec 26, 2024 12:07:11.174725056 CET1.1.1.1192.168.2.40xbf21No error (0)tackybrushz.click172.67.162.132A (IP address)IN (0x0001)false
                                              • tackybrushz.click
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449731104.21.42.1454436864C:\Users\user\Desktop\5RRVBiCpFI.exe
                                              TimestampBytes transferredDirectionData
                                              2024-12-26 11:07:12 UTC264OUTPOST /api HTTP/1.1
                                              Connection: Keep-Alive
                                              Content-Type: application/x-www-form-urlencoded
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                              Content-Length: 8
                                              Host: tackybrushz.click
                                              2024-12-26 11:07:12 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                              Data Ascii: act=life
                                              2024-12-26 11:07:13 UTC1129INHTTP/1.1 200 OK
                                              Date: Thu, 26 Dec 2024 11:07:13 GMT
                                              Content-Type: text/html; charset=UTF-8
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Set-Cookie: PHPSESSID=k0q05k8fdp1jk9f86j3rmcr102; expires=Mon, 21 Apr 2025 04:53:52 GMT; Max-Age=9999999; path=/
                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                              Cache-Control: no-store, no-cache, must-revalidate
                                              Pragma: no-cache
                                              X-Frame-Options: DENY
                                              X-Content-Type-Options: nosniff
                                              X-XSS-Protection: 1; mode=block
                                              cf-cache-status: DYNAMIC
                                              vary: accept-encoding
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cbxWUKb%2FzWJifTAiawifDnyqrtw1pfH5ljpFLawNGO4OYfeyran%2Bxu2jsWaszo4AUN5xGzh6nCnQUhzurCwLreLBfJkFu44YNVyfEjVaCfkSml6auE%2B09S1DGT1hQoZegw5bLA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8f809b1d4b6b429e-EWR
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1606&min_rtt=1601&rtt_var=612&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2843&recv_bytes=908&delivery_rate=1772920&cwnd=208&unsent_bytes=0&cid=b6d16432e88302ef&ts=931&x=0"
                                              2024-12-26 11:07:13 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                              Data Ascii: 2ok
                                              2024-12-26 11:07:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Target ID:0
                                              Start time:06:06:57
                                              Start date:26/12/2024
                                              Path:C:\Users\user\Desktop\5RRVBiCpFI.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\5RRVBiCpFI.exe"
                                              Imagebase:0x400000
                                              File size:2'369'536 bytes
                                              MD5 hash:7FC182CA899A18D31E703DC27449A876
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:Borland Delphi
                                              Yara matches:
                                              • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:1.4%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:33.8%
                                                Total number of Nodes:139
                                                Total number of Limit Nodes:13
                                                execution_graph 14583 22b148c 14584 22b1494 14583->14584 14584->14584 14587 22faa6c 14584->14587 14586 22b14ac 14588 22faa76 14587->14588 14589 22fdf62 14587->14589 14588->14586 14590 22fdf86 14589->14590 14591 22fe070 14589->14591 14626 23007e3 14590->14626 14601 22ff23c 14591->14601 14594 22fdf9e 14595 23007e3 LoadLibraryA 14594->14595 14600 22fe016 14594->14600 14596 22fdfe0 14595->14596 14597 23007e3 LoadLibraryA 14596->14597 14598 22fdffc 14597->14598 14599 23007e3 LoadLibraryA 14598->14599 14599->14600 14600->14586 14602 23007e3 LoadLibraryA 14601->14602 14603 22ff25f 14602->14603 14604 23007e3 LoadLibraryA 14603->14604 14605 22ff277 14604->14605 14606 23007e3 LoadLibraryA 14605->14606 14607 22ff295 14606->14607 14608 22ff2be 14607->14608 14609 22ff2aa VirtualAlloc 14607->14609 14608->14600 14609->14608 14611 22ff2d8 14609->14611 14610 23007e3 LoadLibraryA 14612 22ff356 14610->14612 14611->14610 14625 22ff531 14611->14625 14612->14608 14615 22ff3ac 14612->14615 14630 23005ea 14612->14630 14613 23007e3 LoadLibraryA 14613->14615 14615->14613 14617 22ff40e 14615->14617 14615->14625 14616 22ff5ef VirtualFree 14616->14608 14618 22ff601 RtlExitUserProcess 14616->14618 14624 22ff470 14617->14624 14617->14625 14634 22fe3cc 14617->14634 14618->14608 14623 22ff58e 14623->14623 14624->14625 14657 22ff96c 14624->14657 14625->14616 14625->14623 14627 23007fa 14626->14627 14628 2300821 14627->14628 14695 22fe8e8 14627->14695 14628->14594 14633 23005ff 14630->14633 14631 2300675 LoadLibraryA 14632 230067f 14631->14632 14632->14612 14633->14631 14633->14632 14635 23005ea LoadLibraryA 14634->14635 14636 22fe3e0 14635->14636 14639 22fe3e8 14636->14639 14681 2300688 14636->14681 14639->14625 14648 22fe4c7 14639->14648 14640 22fe41e VirtualProtect 14640->14639 14641 22fe432 14640->14641 14642 22fe44c VirtualProtect 14641->14642 14643 2300688 LoadLibraryA 14642->14643 14644 22fe46d 14643->14644 14644->14639 14645 22fe484 VirtualProtect 14644->14645 14645->14639 14646 22fe494 14645->14646 14647 22fe4a9 VirtualProtect 14646->14647 14647->14639 14649 23005ea LoadLibraryA 14648->14649 14650 22fe4dd 14649->14650 14651 2300688 LoadLibraryA 14650->14651 14652 22fe4ed 14651->14652 14653 22fe52a 14652->14653 14654 22fe4f6 VirtualProtect 14652->14654 14653->14624 14654->14653 14655 22fe506 14654->14655 14656 22fe515 VirtualProtect 14655->14656 14656->14653 14658 22ff9a7 14657->14658 14659 22ff9ee NtCreateSection 14658->14659 14661 22ffa13 14658->14661 14680 230001b 14658->14680 14659->14661 14659->14680 14660 22ffaa8 NtMapViewOfSection 14671 22ffac8 14660->14671 14661->14660 14661->14680 14662 22ffdf1 VirtualAlloc 14667 22ffe33 14662->14667 14663 23005ea LoadLibraryA 14663->14671 14664 23005ea LoadLibraryA 14670 22ffd4f 14664->14670 14665 22ffee4 VirtualProtect 14668 22fffaf VirtualProtect 14665->14668 14676 22fff04 14665->14676 14666 22ffded 14666->14662 14667->14665 14678 22ffed1 NtMapViewOfSection 14667->14678 14667->14680 14673 22fffde 14668->14673 14669 2300688 LoadLibraryA 14669->14671 14670->14662 14670->14664 14670->14666 14675 2300688 LoadLibraryA 14670->14675 14671->14663 14671->14669 14671->14670 14671->14680 14672 2300129 14674 2300131 CreateThread 14672->14674 14672->14680 14673->14672 14673->14680 14691 230039d 14673->14691 14674->14680 14675->14670 14676->14668 14679 22fff89 VirtualProtect 14676->14679 14678->14665 14678->14680 14679->14676 14680->14625 14682 23006a3 14681->14682 14684 22fe400 14681->14684 14682->14684 14685 22fea8d 14682->14685 14684->14639 14684->14640 14686 22fead2 14685->14686 14689 22feaac 14685->14689 14687 23005ea LoadLibraryA 14686->14687 14688 22feadf 14686->14688 14687->14688 14688->14684 14689->14686 14689->14688 14690 2300688 LoadLibraryA 14689->14690 14690->14689 14694 23003c5 14691->14694 14692 23005b7 14692->14672 14693 2300688 LoadLibraryA 14693->14694 14694->14692 14694->14693 14696 22fe908 14695->14696 14698 22fe9ed 14695->14698 14697 22fea8d LoadLibraryA 14696->14697 14696->14698 14697->14698 14698->14627 14699 22b0667 14700 22b0675 14699->14700 14713 22b0fb7 14700->14713 14702 22b080d GetPEB 14704 22b088a 14702->14704 14703 22b07c8 14703->14702 14712 22b0afb 14703->14712 14716 22b0d77 14704->14716 14707 22b08eb CreateThread 14708 22b08c3 14707->14708 14728 22b0c27 GetPEB 14707->14728 14708->14712 14724 22b1277 GetPEB 14708->14724 14710 22b0d77 4 API calls 14710->14712 14726 22b0fd7 GetPEB 14713->14726 14715 22b0fc4 14715->14703 14717 22b0d8d CreateToolhelp32Snapshot 14716->14717 14719 22b08bd 14717->14719 14720 22b0dc4 Thread32First 14717->14720 14719->14707 14719->14708 14720->14719 14721 22b0deb 14720->14721 14721->14719 14722 22b0e22 Wow64SuspendThread 14721->14722 14723 22b0e4c CloseHandle 14721->14723 14722->14723 14723->14721 14725 22b0945 14724->14725 14725->14710 14725->14712 14727 22b0ff2 14726->14727 14727->14715 14729 22b0c80 14728->14729 14730 22b0ce0 CreateThread 14729->14730 14731 22b0d2d 14729->14731 14730->14729 14732 22b1457 14730->14732 14733 22b145c 14732->14733 14735 22b1461 14733->14735 14736 22b1469 14735->14736 14740 22b148c 14736->14740 14738 22b1487 14739 22b148c 18 API calls 14738->14739 14739->14738 14741 22b1494 14740->14741 14741->14741 14742 22faa6c 18 API calls 14741->14742 14743 22b14ac 14742->14743 14743->14738
                                                APIs
                                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000,00000000), ref: 022FFA05
                                                • NtMapViewOfSection.NTDLL(?,00000000), ref: 022FFAAD
                                                • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 022FFE21
                                                • NtMapViewOfSection.NTDLL(?,00000000,?,?,?,?,?,?), ref: 022FFED6
                                                • VirtualProtect.KERNEL32(?,?,00000008,?,?,?,?,?,?,?), ref: 022FFEF3
                                                • VirtualProtect.KERNEL32(?,?,?,00000000), ref: 022FFF96
                                                • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,?,?,?,?), ref: 022FFFC9
                                                • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?), ref: 0230013A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Virtual$ProtectSection$CreateView$AllocThread
                                                • String ID:
                                                • API String ID: 1248616170-0
                                                • Opcode ID: 34e3949558d47ac2efbd442dc042839410f73323f736e1ca0bff09bbd7760ed0
                                                • Instruction ID: 78dc2d836b6a6e642a149dab0853d2015c5ca381aa0a724ffb0e75da8df4149b
                                                • Opcode Fuzzy Hash: 34e3949558d47ac2efbd442dc042839410f73323f736e1ca0bff09bbd7760ed0
                                                • Instruction Fuzzy Hash: 32429C71618301AFD768CF64C984B6BB7E9FF88704F04492DFA859B291E770E845CBA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 187 22b0d77-22b0dbe CreateToolhelp32Snapshot 190 22b0e94-22b0e97 187->190 191 22b0dc4-22b0de5 Thread32First 187->191 192 22b0deb-22b0df1 191->192 193 22b0e80-22b0e8f 191->193 194 22b0df3-22b0df9 192->194 195 22b0e60-22b0e7a 192->195 193->190 194->195 196 22b0dfb-22b0e1a 194->196 195->192 195->193 196->195 199 22b0e1c-22b0e20 196->199 200 22b0e38-22b0e47 199->200 201 22b0e22-22b0e36 Wow64SuspendThread 199->201 202 22b0e4c-22b0e5e CloseHandle 200->202 201->202 202->195
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,?,?,?,?,?,022B08BD,?,00000001,?,81EC8B55,000000FF), ref: 022B0DB5
                                                • Thread32First.KERNEL32(00000000,0000001C), ref: 022B0DE1
                                                • Wow64SuspendThread.KERNEL32(00000000), ref: 022B0E34
                                                • CloseHandle.KERNEL32(00000000), ref: 022B0E5E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CloseCreateFirstHandleSnapshotSuspendThreadThread32Toolhelp32Wow64
                                                • String ID:
                                                • API String ID: 1849706056-0
                                                • Opcode ID: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                                                • Instruction ID: cd0e873677c8bd25835692ca0c7d14c2190a3299e2084ea9b1e69a0ccce43d87
                                                • Opcode Fuzzy Hash: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                                                • Instruction Fuzzy Hash: BF411C75A00109AFDB19DF98C890FEEB7B6EF88340F108168E6159B794DB34EE41CB94

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 343 22b0c27-22b0c7e GetPEB 344 22b0c89-22b0c8d 343->344 345 22b0d2d-22b0d34 344->345 346 22b0c93-22b0c9e 344->346 347 22b0d3f-22b0d43 345->347 348 22b0d28 346->348 349 22b0ca4-22b0cbb 346->349 351 22b0d45-22b0d52 347->351 352 22b0d54-22b0d5b 347->352 348->344 353 22b0cbd-22b0cde 349->353 354 22b0ce0-22b0cf8 CreateThread 349->354 351->347 356 22b0d5d-22b0d5f 352->356 357 22b0d64-22b0d69 352->357 358 22b0cfc-22b0d04 353->358 354->358 356->357 358->348 360 22b0d06-22b0d23 358->360 360->348
                                                APIs
                                                • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 022B0CF3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CreateThread
                                                • String ID: ,
                                                • API String ID: 2422867632-3772416878
                                                • Opcode ID: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                                                • Instruction ID: d793d46912f01ebab4fa8c523c4069566de4905e5b68b314a322a87a3573cdd1
                                                • Opcode Fuzzy Hash: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                                                • Instruction Fuzzy Hash: 0B41B274A00209EFDB15CF98C994BAEB7B1FF88314F208198E515AB395C771AA85CF94

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 390 22b0667-22b07cf call 22b0c17 call 22b1217 call 22b13c7 call 22b0fb7 399 22b0c00-22b0c03 390->399 400 22b07d5-22b07dc 390->400 401 22b07e7-22b07eb 400->401 402 22b080d-22b0888 GetPEB 401->402 403 22b07ed-22b080b call 22b1137 401->403 405 22b0893-22b0897 402->405 403->401 406 22b0899-22b08ad 405->406 407 22b08af-22b08c1 call 22b0d77 405->407 406->405 413 22b08eb-22b090c CreateThread 407->413 414 22b08c3-22b08e9 407->414 415 22b090f-22b0913 413->415 414->415 417 22b0919-22b094c call 22b1277 415->417 418 22b0bd4-22b0bf7 415->418 417->418 422 22b0952-22b09a1 417->422 418->399 424 22b09ac-22b09b2 422->424 425 22b09fa-22b09fe 424->425 426 22b09b4-22b09ba 424->426 429 22b0acc-22b0bbf call 22b0d77 call 22b0c17 call 22b1217 425->429 430 22b0a04-22b0a11 425->430 427 22b09cd-22b09d1 426->427 428 22b09bc-22b09cb 426->428 431 22b09f8 427->431 432 22b09d3-22b09e1 427->432 428->427 456 22b0bc1 429->456 457 22b0bc4-22b0bce 429->457 433 22b0a1c-22b0a22 430->433 431->424 432->431 434 22b09e3-22b09f5 432->434 437 22b0a52-22b0a55 433->437 438 22b0a24-22b0a32 433->438 434->431 439 22b0a58-22b0a5f 437->439 441 22b0a50 438->441 442 22b0a34-22b0a43 438->442 439->429 444 22b0a61-22b0a6a 439->444 441->433 442->441 446 22b0a45-22b0a4e 442->446 444->429 447 22b0a6c-22b0a7c 444->447 446->437 449 22b0a87-22b0a93 447->449 451 22b0a95-22b0ac2 449->451 452 22b0ac4-22b0aca 449->452 451->449 452->439 456->457 457->418
                                                APIs
                                                • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,?,00000001,?,81EC8B55,000000FF), ref: 022B090A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: CreateThread
                                                • String ID:
                                                • API String ID: 2422867632-0
                                                • Opcode ID: 9f100922927d95f7d89a2249628a3f1dcc35b7966142a06a62fc29a8db85cd85
                                                • Instruction ID: f5405dc54074efa98a5904656921d9b4b347daf50355b1385c01b69017087cf3
                                                • Opcode Fuzzy Hash: 9f100922927d95f7d89a2249628a3f1dcc35b7966142a06a62fc29a8db85cd85
                                                • Instruction Fuzzy Hash: 6912D1B0E10219DBDB15CF98C990BEEBBB2FF89304F2482A9D515AB385C7746A41CF54

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 203 22fe3cc-22fe3e6 call 23005ea 206 22fe3ee-22fe407 call 2300688 203->206 207 22fe3e8-22fe3e9 203->207 211 22fe4bf 206->211 212 22fe40d-22fe418 206->212 208 22fe4c3-22fe4c6 207->208 213 22fe4c1-22fe4c2 211->213 212->211 214 22fe41e-22fe42c VirtualProtect 212->214 213->208 214->211 215 22fe432-22fe474 call 23005e0 call 2300c58 VirtualProtect call 2300688 214->215 215->211 222 22fe476-22fe482 215->222 222->211 223 22fe484-22fe492 VirtualProtect 222->223 223->211 224 22fe494-22fe4bd call 23005e0 call 2300c58 VirtualProtect 223->224 224->213
                                                APIs
                                                  • Part of subcall function 023005EA: LoadLibraryA.KERNEL32(00000000,?,?), ref: 0230067C
                                                • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?), ref: 022FE427
                                                • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 022FE45A
                                                • VirtualProtect.KERNEL32(00000000,0040145E,00000040,?), ref: 022FE48D
                                                • VirtualProtect.KERNEL32(00000000,0040145E,?,?), ref: 022FE4B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ProtectVirtual$LibraryLoad
                                                • String ID:
                                                • API String ID: 895956442-0
                                                • Opcode ID: 544c524c5f03252b96133d4295c441da5d44db607709df4b952f0ae727dfced4
                                                • Instruction ID: 3ef512f845db5796f802ad89cff1d6e83cd9329e937d1291506a98af9ad03a88
                                                • Opcode Fuzzy Hash: 544c524c5f03252b96133d4295c441da5d44db607709df4b952f0ae727dfced4
                                                • Instruction Fuzzy Hash: 5C210B721042497FE364A9E08C84F7BB69CDB85304F45043EFF46D21E0FB69A90587B1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 229 22ff23c-22ff2a0 call 23007e3 * 3 236 22ff2ca 229->236 237 22ff2a2-22ff2a4 229->237 239 22ff2cd-22ff2d7 236->239 237->236 238 22ff2a6-22ff2a8 237->238 238->236 240 22ff2aa-22ff2bc VirtualAlloc 238->240 241 22ff2be-22ff2c5 240->241 242 22ff2d8-22ff2fb call 2300c58 call 2300c7c 240->242 241->236 244 22ff2c7 241->244 248 22ff2fd-22ff333 call 2300950 call 2300826 242->248 249 22ff345-22ff35e call 23007e3 242->249 244->236 260 22ff339-22ff33f 248->260 261 22ff594-22ff59d 248->261 249->236 255 22ff364 249->255 257 22ff36a-22ff370 255->257 258 22ff3ac-22ff3b5 257->258 259 22ff372-22ff378 257->259 263 22ff40e-22ff419 258->263 264 22ff3b7-22ff3bd 258->264 262 22ff37a-22ff37d 259->262 260->249 260->261 265 22ff59f-22ff5a2 261->265 266 22ff5a4-22ff5ac 261->266 269 22ff37f-22ff384 262->269 270 22ff391-22ff393 262->270 267 22ff41b-22ff424 call 22fe530 263->267 268 22ff432-22ff435 263->268 271 22ff3c1-22ff3dc call 23007e3 264->271 265->266 272 22ff5db 265->272 266->272 273 22ff5ae-22ff5d9 call 2300c7c 266->273 279 22ff590 267->279 289 22ff42a-22ff430 267->289 278 22ff43b-22ff444 268->278 268->279 269->270 276 22ff386-22ff38f 269->276 270->258 277 22ff395-22ff3a3 call 23005ea 270->277 294 22ff3de-22ff3e6 271->294 295 22ff3fb-22ff40c 271->295 275 22ff5df-22ff5ff call 2300c7c VirtualFree 272->275 273->275 299 22ff605-22ff607 275->299 300 22ff601-22ff603 RtlExitUserProcess 275->300 276->262 276->270 291 22ff3a8-22ff3aa 277->291 285 22ff44a-22ff451 278->285 286 22ff446 278->286 279->261 292 22ff453-22ff45c call 22fe3cc 285->292 293 22ff481-22ff485 285->293 286->285 289->285 291->257 309 22ff45e-22ff464 292->309 310 22ff46a-22ff46b call 22fe4c7 292->310 297 22ff48b-22ff4ad 293->297 298 22ff527-22ff52a 293->298 294->279 302 22ff3ec-22ff3f5 294->302 295->263 295->271 297->279 314 22ff4b3-22ff4c6 call 2300c58 297->314 303 22ff57c-22ff57e call 22ff96c 298->303 304 22ff52c-22ff52f 298->304 299->239 300->299 302->279 302->295 313 22ff583-22ff584 303->313 304->303 306 22ff531-22ff534 304->306 311 22ff54d-22ff55e call 22ff02d 306->311 312 22ff536-22ff538 306->312 309->279 309->310 320 22ff470-22ff473 310->320 330 22ff56f-22ff57a call 22feaf9 311->330 331 22ff560-22ff56c call 22ff60c 311->331 312->311 316 22ff53a-22ff53d 312->316 317 22ff585-22ff58c 313->317 328 22ff4ea-22ff523 314->328 329 22ff4c8-22ff4cc 314->329 322 22ff53f-22ff542 316->322 323 22ff544-22ff54b call 23001da 316->323 317->279 324 22ff58e 317->324 320->293 321 22ff475-22ff47b 320->321 321->279 321->293 322->317 322->323 323->313 324->324 328->279 340 22ff525 328->340 329->328 334 22ff4ce-22ff4d1 329->334 330->313 331->330 334->298 337 22ff4d3-22ff4e8 call 2300a5b 334->337 337->340 340->298
                                                APIs
                                                • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 022FF2B6
                                                • VirtualFree.KERNELBASE(00000000,00000000,0000C000), ref: 022FF5FA
                                                • RtlExitUserProcess.NTDLL(00000000), ref: 022FF603
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: Virtual$AllocExitFreeProcessUser
                                                • String ID:
                                                • API String ID: 1828502597-0
                                                • Opcode ID: 3017fd99d0584aa20b0153e116f0a50b272e6a421316d4372083565c5f77b8b3
                                                • Instruction ID: 3194d89b8332b8cd50247336ffa33549cec893b6fe706e0a83f494ed3becacdc
                                                • Opcode Fuzzy Hash: 3017fd99d0584aa20b0153e116f0a50b272e6a421316d4372083565c5f77b8b3
                                                • Instruction Fuzzy Hash: D3B11272510703ABCB759EA0CE90BABF7E9BF09304F100939EB4996994E730E554CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 362 23005ea-23005fd 363 2300615-230061f 362->363 364 23005ff-2300602 362->364 366 2300621-2300629 363->366 367 230062e-230063a 363->367 365 2300604-2300607 364->365 365->363 368 2300609-2300613 365->368 366->367 369 230063d-2300642 367->369 368->363 368->365 370 2300644-230064f 369->370 371 2300675-230067c LoadLibraryA 369->371 373 2300651-2300669 call 2300cb8 370->373 374 230066b-230066f 370->374 372 230067f-2300683 371->372 373->374 378 2300684-2300686 373->378 374->369 375 2300671-2300673 374->375 375->371 375->372 378->372
                                                APIs
                                                • LoadLibraryA.KERNEL32(00000000,?,?), ref: 0230067C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID: .dll
                                                • API String ID: 1029625771-2738580789
                                                • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                                • Instruction ID: 54c242f614c7c2940cd6b5740dc0041ed7837b29b19769f1937a27c1aaedeebc
                                                • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                                • Instruction Fuzzy Hash: 5E212C756006A99FDB25CFECC4D4B6E7BA5EF45228F08416CD806CBA81DB30E845C7A0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 379 22fe4c7-22fe4f4 call 23005ea call 2300688 384 22fe52a 379->384 385 22fe4f6-22fe504 VirtualProtect 379->385 387 22fe52c-22fe52f 384->387 385->384 386 22fe506-22fe528 call 2300c58 VirtualProtect 385->386 386->387
                                                APIs
                                                  • Part of subcall function 023005EA: LoadLibraryA.KERNEL32(00000000,?,?), ref: 0230067C
                                                • VirtualProtect.KERNEL32(00000000,00000004,00000040,?), ref: 022FE4FF
                                                • VirtualProtect.KERNEL32(00000000,00000004,?,?), ref: 022FE522
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID: ProtectVirtual$LibraryLoad
                                                • String ID:
                                                • API String ID: 895956442-0
                                                • Opcode ID: 355f7a5a870867b02340d2dab44903ecb3bac44aab23468b058fab7a7d97728b
                                                • Instruction ID: 2657a1e2b12daae8a99977c7cb706418bf62c317d0222b51da0a4013e03f9b05
                                                • Opcode Fuzzy Hash: 355f7a5a870867b02340d2dab44903ecb3bac44aab23468b058fab7a7d97728b
                                                • Instruction Fuzzy Hash: 5CF081B61106047EE721AAA4CC41FFB73ACDB49611F410428FB06D6080FB61B6458BB5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 458 22e615e-22e6522 459 22e6524-22e6529 458->459 460 22e652b-22e6591 459->460 461 22e6593-22e65cc 459->461 460->459 462 22e65ce-22e65d6 461->462 463 22e65ec-22e6656 462->463 464 22e65d8-22e65ea 462->464 465 22e6658-22e665b 463->465 464->462 466 22e665d-22e6681 465->466 467 22e6683-22e66b1 465->467 466->465 468 22e66b3-22e66bb 467->468 469 22e66bd-22e66cf 468->469 470 22e66d1-22e672d 468->470 469->468 471 22e672f-22e6732 470->471 472 22e6734-22e67a3 471->472 473 22e67a5-22e67ca 471->473 472->471 474 22e67cc-22e67cf 473->474 475 22e680b-22e680e 474->475 476 22e67d1-22e6809 474->476 477 22e6810-22e6816 475->477 476->474 478 22e681d-22e682f 477->478 479 22e6818 477->479 481 22e6833-22e6839 478->481 482 22e6831 478->482 480 22e68ae-22e68e1 479->480 483 22e689f-22e68a2 481->483 484 22e683b-22e689c call 22ec4e4 481->484 482->483 486 22e68a6-22e68a9 483->486 487 22e68a4 483->487 484->483 486->477 487->480
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: $!$"$$$%$%$&$($)$*$+$,$-$.$.$.$0$0$1$2$4$4$4$5$6$8$:$;$;$<$=$>$>$?$?$@$B$C$D$D$F$H$J$L$M$N$N$N$O$P$R$T$U$V$X$Z$Z$Z$[$\$\$]$^$^$`$a$b$c$d$e$e$e$e$f$g$h$i$i$j$k$l$l$m$n$o$p$p$r$s$t$t$t$v$v$x$x$z$|$}$~$~$~
                                                • API String ID: 0-1394229784
                                                • Opcode ID: 0ad0ccab371ecf03d36c413c93bc7494f07a7df5888065dda6a46f4b89f4694b
                                                • Instruction ID: 483c89d986e3f802783609f8ce2c9e959f8887dbd42d387d3ced67ff5fb8f4e8
                                                • Opcode Fuzzy Hash: 0ad0ccab371ecf03d36c413c93bc7494f07a7df5888065dda6a46f4b89f4694b
                                                • Instruction Fuzzy Hash: F8226A2190C7D9CDEB26C678CC587DDBEA15B62314F4841D9C19D6B3C2C7BA0B89CB26

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 493 22e5bcc-22e5d06 494 22e5d08-22e5d0b 493->494 495 22e5da6-22e5de3 494->495 496 22e5d11-22e5da1 494->496 497 22e5de5-22e5ded 495->497 496->494 498 22e5def-22e5e01 497->498 499 22e5e03-22e5e6d 497->499 498->497 500 22e5e6f-22e5e72 499->500 501 22e5ed7-22e5f05 500->501 502 22e5e74-22e5ed5 500->502 503 22e5f07-22e5f0f 501->503 502->500 504 22e5f25-22e5f81 503->504 505 22e5f11-22e5f23 503->505 506 22e5f83-22e5f86 504->506 505->503 507 22e5f88-22e5fb0 506->507 508 22e5fb2-22e5fd1 506->508 507->506 509 22e5fd3-22e5fd6 508->509 510 22e5fd8-22e6010 509->510 511 22e6012-22e6015 509->511 510->509 512 22e6017-22e601d 511->512 513 22e601f 512->513 514 22e6024-22e6036 512->514 515 22e60a9-22e60ce 513->515 516 22e603a-22e6040 514->516 517 22e6038 514->517 518 22e609a-22e609d 516->518 519 22e6042-22e6097 call 22ec4e4 516->519 517->518 520 22e609f 518->520 521 22e60a1-22e60a4 518->521 519->518 520->515 521->512
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: *$+$0$:$<$>$@$C$`$`$a$b$d$d$f$g$h$n$n$p$s$w$x$z${${$|$|$}
                                                • API String ID: 0-334816167
                                                • Opcode ID: 63cdccc75301cd355fa4edc8c506f7aea9a9e61635fb673e26f729942e3a0ac3
                                                • Instruction ID: cc7beb73d104af828b15d6b53732d44ce3b1293b81a35ffc6f162d3fc9acc6d6
                                                • Opcode Fuzzy Hash: 63cdccc75301cd355fa4edc8c506f7aea9a9e61635fb673e26f729942e3a0ac3
                                                • Instruction Fuzzy Hash: 50F10521D187E98ACB32C6BC8C443DDBFA15B53224F1D43D8D4E9AB3D6C6750A46CB52

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 524 22bad64-22badcd 525 22badd4-22bae16 524->525 525->525 526 22bae18-22bae25 525->526 527 22bae34-22bae67 526->527 527->527 528 22bae69-22baee3 527->528 529 22baee4-22baf2e 528->529 529->529 530 22baf30-22baf4a 529->530 531 22baf54-22baf8c 530->531 531->531 532 22baf8e-22baf97 531->532 533 22baf99-22baf9f 532->533 534 22bafaf-22bafbc 532->534 535 22bafa4-22bafad 533->535 536 22bafcf-22bafd9 534->536 537 22bafbe-22bafc3 534->537 535->534 535->535 539 22bafdb-22bafdf 536->539 540 22bafef-22baff7 536->540 538 22bafc4-22bafcd 537->538 538->536 538->538 541 22bafe4-22bafed 539->541 542 22baff9-22baffa 540->542 543 22bb00f-22bb019 540->543 541->540 541->541 544 22bb004-22bb00d 542->544 545 22bb01b-22bb01f 543->545 546 22bb02f-22bb03d 543->546 544->543 544->544 547 22bb024-22bb02d 545->547 548 22bb04f-22bb094 546->548 549 22bb03f-22bb043 546->549 547->546 547->547 551 22bb09e-22bb0b5 548->551 552 22bb096-22bb09d 548->552 550 22bb044-22bb04d 549->550 550->548 550->550 553 22bb0c4-22bb11e 551->553 552->551 553->553 554 22bb120-22bb137 553->554 555 22bb144-22bb1a2 554->555 555->555 556 22bb1a4-22bb1ab 555->556 557 22bb1ad-22bb1b9 556->557 558 22bb1d1-22bb1d5 556->558 559 22bb1c4-22bb1cd 557->559 560 22bb1d9-22bb1e2 558->560 559->559 563 22bb1cf 559->563 561 22bb1ff-22bb209 560->561 562 22bb1e4-22bb1e7 560->562 565 22bb20b-22bb20f 561->565 566 22bb21f-22bb231 561->566 564 22bb1f4-22bb1fd 562->564 563->560 564->561 564->564 567 22bb214-22bb21d 565->567 567->566 567->567
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: 7]7N$9/,8$; >?$<'=0$LSJm$PVNR$R:e}$`{R2$agsy$p~rs$rz|x$sD/f$wkoq$~p~9
                                                • API String ID: 0-2345621967
                                                • Opcode ID: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                • Instruction ID: 1238ae657b08ddb23cb2563d2a3e40b2733e93eba81d7af3b39b3b0a6cf12557
                                                • Opcode Fuzzy Hash: a9be2e0f6340cc52a81f7dbe1f742bb92054bc815233c9bebfa9ac53ecd4af8d
                                                • Instruction Fuzzy Hash: 29C1597150C3858BD316CE6584A07ABBFE1EFD2345F18856CE8E11B386D739490ACB66

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 568 22c1531-22c1549 569 22c154b-22c154e 568->569 570 22c157c-22c1597 call 22b3974 569->570 571 22c1550-22c157a 569->571 574 22c159d-22c15b7 570->574 575 22c1818 570->575 571->569 576 22c15bb-22c15be 574->576 577 22c3791-22c3798 575->577 578 22c1605-22c1624 call 22b3974 576->578 579 22c15c0-22c1603 576->579 580 22c379a-22c379d call 22b3a74 577->580 578->575 591 22c162a-22c1642 578->591 579->576 588 22c09e8-22c0a10 call 22b3a84 580->588 589 22c09e1-22c37ae 580->589 595 22c0a14-22c0a17 588->595 594 22c1644-22c1647 591->594 596 22c1649-22c1671 594->596 597 22c1673-22c168e call 22b3974 594->597 599 22c0a19-22c0a55 595->599 600 22c0a57-22c0a78 call 22b3974 595->600 596->594 597->575 603 22c1694-22c16ac 597->603 599->595 606 22c0a7c 600->606 607 22c0a7a-22c0a99 600->607 605 22c16ae-22c16b1 603->605 608 22c16e0-22c16fb call 22b3974 605->608 609 22c16b3-22c16de 605->609 606->580 612 22c0a9b-22c0a9e 607->612 608->575 616 22c1701-22c1719 608->616 609->605 614 22c0ab7-22c0b0b call 22b34b4 612->614 615 22c0aa0-22c0ab5 612->615 614->577 620 22c0b11 614->620 615->612 619 22c171b-22c171e 616->619 621 22c1737-22c1752 call 22b3974 619->621 622 22c1720-22c1735 619->622 620->577 621->575 625 22c1758-22c177e 621->625 622->619 626 22c1780-22c1783 625->626 627 22c1785-22c17e1 626->627 628 22c17e3-22c1810 call 22b3974 626->628 627->626 628->577 631 22c1816-22c1835 628->631 633 22c1837-22c183a 631->633 634 22c183c-22c1865 633->634 635 22c1867-22c1896 call 22b33b4 633->635 634->633 638 22c1898-22c189b 635->638 639 22c189d-22c18f7 638->639 640 22c18f9-22c1928 call 22b33b4 638->640 639->638 643 22c192a-22c192d 640->643 644 22c192f-22c1973 643->644 645 22c1975-22c19a4 call 22b35c4 643->645 644->643 648 22c19a6-22c19a9 645->648 649 22c19fa-22c1a29 call 22b33b4 648->649 650 22c19ab-22c19f8 648->650 653 22c1a2b-22c1a2e 649->653 650->648 654 22c1aa8-22c1b1d call 22b34b4 653->654 655 22c1a30-22c1aa6 653->655 658 22c1b1f-22c1b22 654->658 655->653 659 22c1b24-22c1b54 658->659 660 22c1b56-22c1bdc call 22b34b4 call 22c5724 658->660 659->658 665 22c1bde 660->665 666 22c1be0-22c1c73 call 22b9a94 call 22bc1a4 call 22ea9d4 call 22b9aa4 call 22eac74 660->666 665->666 677 22c1c7c-22c1cc3 666->677 678 22c1c75-22c1c77 666->678 680 22c1cc5-22c1cc8 677->680 681 22c22ae-22c22bc call 22eade4 678->681 682 22c1cca-22c1d00 680->682 683 22c1d02-22c1d09 680->683 681->577 682->680 685 22c1d0b-22c1d16 683->685 687 22c1d1d-22c1d34 685->687 688 22c1d18 685->688 691 22c1d38-22c1d43 687->691 692 22c1d36-22c1d95 687->692 690 22c1da8-22c1dab 688->690 693 22c1dad 690->693 694 22c1daf-22c1ddd 690->694 696 22c1d45-22c1d93 call 22ec4e4 691->696 697 22c1d97-22c1d9c 691->697 692->697 693->694 701 22c1ddf-22c1de2 694->701 696->697 699 22c1d9e 697->699 700 22c1da0-22c1da3 697->700 699->690 700->685 703 22c1de4-22c1e0f 701->703 704 22c1e11-22c1e1a 701->704 703->701 705 22c22a8-22c22ac 704->705 706 22c1e20-22c1e7f call 22ea964 704->706 705->681 709 22c1e81-22c1e84 706->709 710 22c1ebe-22c1ecc 709->710 711 22c1e86-22c1ebc 709->711 712 22c1ece-22c1ed9 710->712 711->709 713 22c1edb 712->713 714 22c1ee0-22c1ef5 712->714 715 22c1f64-22c1f6e 713->715 716 22c1ef9-22c1f09 714->716 717 22c1ef7 714->717 720 22c1f70 715->720 721 22c1f72-22c1f75 715->721 718 22c1f55-22c1f58 716->718 719 22c1f0b-22c1f50 call 22ec4e4 716->719 717->718 725 22c1f5c-22c1f5f 718->725 726 22c1f5a 718->726 719->718 720->721 722 22c2299-22c22a3 call 22ea9a4 721->722 723 22c1f7b-22c1faa call 22c5724 721->723 722->705 731 22c1fac 723->731 732 22c1fae-22c1ff9 call 22b9a94 call 22bc1a4 723->732 725->712 726->715 731->732 737 22c1ffb-22c1ffd 732->737 738 22c1fff-22c200b 737->738 739 22c2016-22c2018 737->739 740 22c200d-22c2014 738->740 741 22c200f 738->741 742 22c201a-22c2044 739->742 740->737 741->742 743 22c2048-22c20c1 call 22b9a94 call 22c57a4 call 22bb6b4 call 22b9aa4 742->743 744 22c2046 742->744 757 22c20c5-22c2114 call 22b9a94 call 22e8ea4 call 22b9aa4 call 22c5724 743->757 758 22c20c3 743->758 744->743 769 22c2118-22c215e call 22b9a94 call 22bc1a4 call 22ba614 757->769 770 22c2116 757->770 758->757 777 22c2160-22c2171 call 22b3a74 769->777 770->769 780 22c2178-22c2196 call 22b3a54 call 22b3494 777->780 781 22c2173-22c2297 call 22b9aa4 * 2 call 22bb234 call 22ba6f4 777->781 790 22c219d-22c21c5 call 22c5724 780->790 791 22c2198 780->791 781->722 799 22c21c9-22c2249 call 22b9a94 call 22bc1a4 call 22d2924 call 22b9aa4 790->799 800 22c21c7 790->800 793 22c224b-22c2256 791->793 793->777 799->793 800->799
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: &$+$4$@$C$O$T$Y$Z$\$g$q$t
                                                • API String ID: 0-2174627302
                                                • Opcode ID: 2c149d579c2bfbe290bb8fc034ca28ef72b0ce807b879de6ec01245955241a86
                                                • Instruction ID: 78a10e1860d536fdacafde93ef2b8565cf232d0e309671c3ad10c3103915763a
                                                • Opcode Fuzzy Hash: 2c149d579c2bfbe290bb8fc034ca28ef72b0ce807b879de6ec01245955241a86
                                                • Instruction Fuzzy Hash: 7F72907162C7818FD324DB78C4953AEBBE2AFC5310F294A2DD5D98738ADA798445CB03
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: *B)$*B)$<=$O)O+$Q5Z7$T!M#$U1D3$V%G'$XY$\9X;$p-B/
                                                • API String ID: 0-898000180
                                                • Opcode ID: 9fc2874815f84d3ef4346084d008133ae0ec9231113661370af9e7ee02782906
                                                • Instruction ID: eab154baa7d2aa29df3735291e91e6a9cb30b96107426b6a651bb0f018be3b8e
                                                • Opcode Fuzzy Hash: 9fc2874815f84d3ef4346084d008133ae0ec9231113661370af9e7ee02782906
                                                • Instruction Fuzzy Hash: 7AC1DDB12583128BDB14CFA8C89176BB7F2EF96754F088A5CF4D64B398E3348941C796
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: A;$BC$C$T'g)$X&c8$Y/9Q$w!s#$z7}9A3q5
                                                • API String ID: 0-4124187736
                                                • Opcode ID: b153d1fc5e8c49ab62819e924da86a1564e16a90d23bd0416ffed42527983d6d
                                                • Instruction ID: 7775c49612fc7501db0236f7301b4553ebd84315e42eb2939c513f4b23738a1b
                                                • Opcode Fuzzy Hash: b153d1fc5e8c49ab62819e924da86a1564e16a90d23bd0416ffed42527983d6d
                                                • Instruction Fuzzy Hash: 1912DA72A183418BD714CFA8C881B6BBBE6FFC5304F14492CE696DB2A0D774D905CB92
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: 4%$>V$>V$<>$EG$IK$UW$|~
                                                • API String ID: 0-2246970021
                                                • Opcode ID: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                • Instruction ID: 88c3a8f843b41b8cecd2b6958cb59ee929c0f030659740cfb6c8117c967ac90f
                                                • Opcode Fuzzy Hash: cc1dde96a411e1e6fcd6a59f7ef47bdc2781b26c4dfcad69bf9094ee8fc7f5bd
                                                • Instruction Fuzzy Hash: 753242B0611B469FDB48CF2AD580389BBB1FF45300F548698C9595FB5ADB35A8A2CFC0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: !@$,$T$U$V$h
                                                • API String ID: 0-1072848446
                                                • Opcode ID: 8e8ca45835480ccfa162dc2bafbba4cee2664ffe78ab865597f6f2298b61ffbe
                                                • Instruction ID: 555fc9e558111f667d7a4dcc3d8ebd8c7033deeeb06b6ec483d29c724d8b5101
                                                • Opcode Fuzzy Hash: 8e8ca45835480ccfa162dc2bafbba4cee2664ffe78ab865597f6f2298b61ffbe
                                                • Instruction Fuzzy Hash: 7C22A13162C7918FD360CBA8C44436EBBE1ABC6314F058A6DE9D687396D7B9C844CB43
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: &=$0$5$D@6T$EF$zJyL
                                                • API String ID: 0-3264166258
                                                • Opcode ID: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                • Instruction ID: b56f50062fe5d3088f56d554608751e105d154391204050551bc5591e14d2754
                                                • Opcode Fuzzy Hash: 6f787935f52e1d9f41ee2cdf27def6dc2193743486b37ecbc705986605444a77
                                                • Instruction Fuzzy Hash: 26B1F77011C3818BE368CF6984907BBBBD2EFD6314F198A6DE4DA8B295DB748449C713
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: &'$0c=e$2g1i$<k;m$wy
                                                • API String ID: 0-3335612808
                                                • Opcode ID: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                • Instruction ID: 54f6cf3ff41778149cd164504c47d6a16022c227e8dbda46968ebf01c7e21a8a
                                                • Opcode Fuzzy Hash: eb1d602c92fd99bd83cb42d187dbb3c1cba3f1d687f489207edda56632bda968
                                                • Instruction Fuzzy Hash: 02D10871618301CBD728DF64C86176BB7F2EF92354F189A6CD9828F3A9E7789401CB52
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: &=$5$D@6T$EF$zJyL
                                                • API String ID: 0-923305466
                                                • Opcode ID: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                • Instruction ID: 0e4d6709a1f04c0445846fff31bb2af269856947a3fa2833fd33780399aa72bb
                                                • Opcode Fuzzy Hash: f99561a0788cee97c829df764e2ebd4c7b90c8b56b0bfd503a4f7d65a1aead45
                                                • Instruction Fuzzy Hash: 6FA1F77011C3818BE769CF6984907BBBBD2EFD2304F198A6DD4DA8B295DB748449CB13
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: &=$5$D@6T$EF$zJyL
                                                • API String ID: 0-923305466
                                                • Opcode ID: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                • Instruction ID: 61f3aa79c071d8f477cb9ebdff2dd9d1c2c497d05173bbd59125c72c0d5f71bd
                                                • Opcode Fuzzy Hash: 5eea70b87afb6f6764b4b0a803c2ee816a1ddf72bf9f3ac6a73094afb86f43b5
                                                • Instruction Fuzzy Hash: BCA1F87011C3818BE768CF6984907BBBBD2EFD2304F198A6DD4DA8B295DB748449C713
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: &=$5$D@6T$EF$zJyL
                                                • API String ID: 0-923305466
                                                • Opcode ID: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                • Instruction ID: 7be829eb032d65daffe87ffcf0d1ed9669d48967ea9803c70640bac989e7513a
                                                • Opcode Fuzzy Hash: 964c76fda7f37207e59e987132c18f71186e6d03fd2999a299809d292455ad42
                                                • Instruction Fuzzy Hash: 5BA1E47011C3818BE364CF6984907BBBBD2AFD2304F298A6DD4D98B296DB748449CB53
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: &-$)R_X$[O_[$zusR
                                                • API String ID: 0-3432275560
                                                • Opcode ID: c72d066a0ba9d98f0ff19214e9d8c23779a55738a99cb06a59f657220fc0cf28
                                                • Instruction ID: 154e2fde65c5249c72632fa279a17185bb5b35b3d98e4ee6d2366d8346602ead
                                                • Opcode Fuzzy Hash: c72d066a0ba9d98f0ff19214e9d8c23779a55738a99cb06a59f657220fc0cf28
                                                • Instruction Fuzzy Hash: 9342797051C3818FC725DFA8C85076EBBE2AF86314F08866DE8E44B3A6D775C605CB92
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: %(#}$/$/26-$1
                                                • API String ID: 0-261129489
                                                • Opcode ID: f133d09027ec2c5d3c2aef6507ecce0520632deac5b770a07f28f5cb5c76ebf0
                                                • Instruction ID: 1935a040ce3608cbd99cb070791b73660e9c0dc3409fc809d826fd57931cf8de
                                                • Opcode Fuzzy Hash: f133d09027ec2c5d3c2aef6507ecce0520632deac5b770a07f28f5cb5c76ebf0
                                                • Instruction Fuzzy Hash: 15E1F87212C7C28BE775CF78C4507BABBD6EF92204F18896DD0D987296DB34910ACB52
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: %(#}$/$/26-$1
                                                • API String ID: 0-261129489
                                                • Opcode ID: 47b00d7d64a94561f5ec20e782c8b23bde4d21acf7bd80337db5547180c095d9
                                                • Instruction ID: 12e69094d28e2115649f046aa31e820fbaa4effe55c4b482396d8a82515617c7
                                                • Opcode Fuzzy Hash: 47b00d7d64a94561f5ec20e782c8b23bde4d21acf7bd80337db5547180c095d9
                                                • Instruction Fuzzy Hash: 59E1F57211C7C18BE735CF35C4607BABBD6AFD2204F1888ADC1D98B296DB79410ACB16
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: BI$ZG$3ej$pr
                                                • API String ID: 0-483502859
                                                • Opcode ID: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                • Instruction ID: 8e1b304c482575e81e4f6a3fff87c37bfb497fa03d75ce6085e763e6d94227ad
                                                • Opcode Fuzzy Hash: f72a1af4f7c4914e3558ee5fe4304fc6666decd496300a2b177a412071557166
                                                • Instruction Fuzzy Hash: A3A1C3B52117818FD719CF69C590AA2BBE2FF96340B1A95ADC0D68F766D734E802CF10
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: -$C\$Iz$[^
                                                • API String ID: 0-2105564891
                                                • Opcode ID: 856b381f3345170c9e1f152739ef8b6d943d9b4d3d608726b0c255f8cc161e2c
                                                • Instruction ID: 6390c75819d5a9dd4ee0efb05bd59e31f1cafb392f3ae9a234bacb4d5a89e8dd
                                                • Opcode Fuzzy Hash: 856b381f3345170c9e1f152739ef8b6d943d9b4d3d608726b0c255f8cc161e2c
                                                • Instruction Fuzzy Hash: A881DAB265C3509FD308CFA9885145FFBE2EFD1300F59896CF0E98B255D779960A8B82
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: T$U$V$k
                                                • API String ID: 0-1255220828
                                                • Opcode ID: c93e863c5daac2f8ca78168b26a37bbe867cb239aeeaedccae74f18b85e983c0
                                                • Instruction ID: 8ca404ed1cbc8b296f1a799cbf077b80f20697ec78f0f45bd9c94ce48fc2bbe1
                                                • Opcode Fuzzy Hash: c93e863c5daac2f8ca78168b26a37bbe867cb239aeeaedccae74f18b85e983c0
                                                • Instruction Fuzzy Hash: 20A1123112C3918EDB14DBB8989022EFBD26BC6328F894B2DE4E7873D6D7748945D706
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: 0$V$e
                                                • API String ID: 0-3964817793
                                                • Opcode ID: c7716370ac8927f06ffe637d3cea15850e05a15dbd07c9effa12d3fdb0013073
                                                • Instruction ID: 9f8248275c88b3b293a7fc405db9f31f26795e0ff9bc01cb3d0c8e3a9c0adf2e
                                                • Opcode Fuzzy Hash: c7716370ac8927f06ffe637d3cea15850e05a15dbd07c9effa12d3fdb0013073
                                                • Instruction Fuzzy Hash: BC22E57262C7808BD725DB7884903AEBBD2AFC5320F198F6DD5E9873D5DA748901CB42
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: "w+y$?TUV$DX8Z
                                                • API String ID: 0-3307990326
                                                • Opcode ID: f9c6fa3e94296cf0f303a5eebcc6256c78eaf4459c267ceffca2c103466db4c7
                                                • Instruction ID: d8110762fa1f499e0d3fa37732c0a748761e1088fd7d92bb31537685027aaa75
                                                • Opcode Fuzzy Hash: f9c6fa3e94296cf0f303a5eebcc6256c78eaf4459c267ceffca2c103466db4c7
                                                • Instruction Fuzzy Hash: DB81FF716107228FC728CF29C890666B3F2FF99710B29869CC8824FB69E775E841CB44
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: ,)*k$I,~M
                                                • API String ID: 0-936430989
                                                • Opcode ID: 33fe9d4cb84d20c875b3126a1f51ea659af71ca5d5df44b5ba46a13c9140ded4
                                                • Instruction ID: d1992fb03fd2f95b7a8f170d87e37f0608308054e894937c796bbd307191c401
                                                • Opcode Fuzzy Hash: 33fe9d4cb84d20c875b3126a1f51ea659af71ca5d5df44b5ba46a13c9140ded4
                                                • Instruction Fuzzy Hash: 338216746283415FD724CFA49881B3FBBE2EFC6718F288A2CE58557299D771D802CB46
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: BE$de
                                                • API String ID: 0-1272349043
                                                • Opcode ID: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                • Instruction ID: 7b45a9c33b9ab6b7516f616414177c00674a7d30d38a06eebf2390d36b819424
                                                • Opcode Fuzzy Hash: 4d61e13fd748368ac6030c890ff82cb0220032c3e56c3c983d389722b1fc0e45
                                                • Instruction Fuzzy Hash: 2AD1237262C3518FD729DF6888512BFBBE2AFC6344F18492DE8D19B385D7748906C782
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: )$IEND
                                                • API String ID: 0-707183367
                                                • Opcode ID: 0115d670064ac457273b2f2da0dd0fccc32687026287eda2a08cfdc2e9f8888c
                                                • Instruction ID: 8d9539a787a88f5f990eae090d7483428538f1f2de990b0b5d00c608d06f9d29
                                                • Opcode Fuzzy Hash: 0115d670064ac457273b2f2da0dd0fccc32687026287eda2a08cfdc2e9f8888c
                                                • Instruction Fuzzy Hash: 59D1CAB19183459FE721CF54C88479ABBE8EF84344F04892DFA989B381D3B5D948CB92
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: Fg$RU]l
                                                • API String ID: 0-3680832515
                                                • Opcode ID: 212695677cf782d22b69bcc5005693ffe3c19f735568b368facab7bd000f874a
                                                • Instruction ID: d8fabd6b0d2e48134da6c4491c29723b352c08cbb994a1a192bfdc638bf8a4e8
                                                • Opcode Fuzzy Hash: 212695677cf782d22b69bcc5005693ffe3c19f735568b368facab7bd000f874a
                                                • Instruction Fuzzy Hash: 3371F67121D3C18BE7798F64C8517EBBBD3EBD2214F18996DD0D947296DB38400ADB12
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: @$ihgf
                                                • API String ID: 0-73152791
                                                • Opcode ID: f9d2302128f83c98de01ee7664bc871aec8e86cdf99c8f751253d6371e8ab131
                                                • Instruction ID: 66f7c64cdc26229e4af6d5f377ee0aa7973be7f13093a1f929d35d5a5b9f86d4
                                                • Opcode Fuzzy Hash: f9d2302128f83c98de01ee7664bc871aec8e86cdf99c8f751253d6371e8ab131
                                                • Instruction Fuzzy Hash: 1D4127B1A143028BDB14CF64C8527BBB7A2FF92328F55822CD5568B395E735D905CB82
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: Z\$^P
                                                • API String ID: 0-3724859648
                                                • Opcode ID: 4f7f96cc206f4a51d8ad8bab145ebd28e0a9ebd1b083b1ab060fd53171580dc2
                                                • Instruction ID: 1c6ee1f6c1ca291338c32737225d8540c5db4a5f2cf3fbeaf3ccc88aa6ff2955
                                                • Opcode Fuzzy Hash: 4f7f96cc206f4a51d8ad8bab145ebd28e0a9ebd1b083b1ab060fd53171580dc2
                                                • Instruction Fuzzy Hash: 3841E2B1921601CFC729CF64C891AB2B7B2FF89314B16825CD4978F7A4E738E801CB55
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: @
                                                • API String ID: 0-2766056989
                                                • Opcode ID: 7d58ce99e14cd4456ae23e5809613514da7f6838dea5dcaaa26db1aac14b0b8b
                                                • Instruction ID: 5e613e2bcb8078c9feae59110c9314e250e52882cd41eadb91562d0d3b581f4a
                                                • Opcode Fuzzy Hash: 7d58ce99e14cd4456ae23e5809613514da7f6838dea5dcaaa26db1aac14b0b8b
                                                • Instruction Fuzzy Hash: 8672A530628B498BDB69DF68C8857A9B3E1FB98314F14463ED98BC7245DF34E542CB81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: f
                                                • API String ID: 0-1993550816
                                                • Opcode ID: 63a83f5a27331d9fe3a04257bda5fcaf30bc217a6dc898aca3077588f1bd9e28
                                                • Instruction ID: fe501e8d76f0f13f81d12e172b9f8d5698ff0fcddebb55c491b072aadbad349c
                                                • Opcode Fuzzy Hash: 63a83f5a27331d9fe3a04257bda5fcaf30bc217a6dc898aca3077588f1bd9e28
                                                • Instruction Fuzzy Hash: 502212716283528FDB14CF65C890B2BBBE2BBC5318F488A2CE5D687395DB70D805DB42
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: [
                                                • API String ID: 0-3878419350
                                                • Opcode ID: 5eb09604ed9747dca5d4520930199d487a8f62beec0cfa78d34f9f01c84922a2
                                                • Instruction ID: 9beb86f89714c9c9761df53d216a7496b362ef1314fc42ffb7c582fc2984ba3f
                                                • Opcode Fuzzy Hash: 5eb09604ed9747dca5d4520930199d487a8f62beec0cfa78d34f9f01c84922a2
                                                • Instruction Fuzzy Hash: 03022175611702CBCB34CF69C8D1662B7F2FF95314B29869CC4864B7A9EB39E442CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: ,)*k
                                                • API String ID: 0-1228391949
                                                • Opcode ID: 81a23c36fe8827921ec37ff3d571e3748504ad247d1e8451f876af876380c648
                                                • Instruction ID: 97cf72cafa3dfe7186652f283efc851f21d210320d4e04dfdeadcd37092622b6
                                                • Opcode Fuzzy Hash: 81a23c36fe8827921ec37ff3d571e3748504ad247d1e8451f876af876380c648
                                                • Instruction Fuzzy Hash: 35C15975A183515BDF24DF90C980A3FB7E2ABD6704F599A2CE9C6533A5D7309800D783
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: .
                                                • API String ID: 0-1505114982
                                                • Opcode ID: 2c1d9dc035ef9ac2c180075a27f0a445723f05ffce5a25362c8fe712cfd5ed31
                                                • Instruction ID: d46e5f38bc7d460874fac852d3d6bcdd2b1ecef13e37d21be58f552632e222c1
                                                • Opcode Fuzzy Hash: 2c1d9dc035ef9ac2c180075a27f0a445723f05ffce5a25362c8fe712cfd5ed31
                                                • Instruction Fuzzy Hash: 43C127B1D10652CBCB24CFA8C8517BBB7B1FF85350F2A825DD895AB394E734A841CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: 167H
                                                • API String ID: 0-2704650348
                                                • Opcode ID: 58de4fbba54e7a4bbde6691defe3cface4003d97f8efe76fd78e15d75b2f64aa
                                                • Instruction ID: 3c7eab44d4e2a896805a2ace4c90813a6d07521702acb2d614825787f9930ada
                                                • Opcode Fuzzy Hash: 58de4fbba54e7a4bbde6691defe3cface4003d97f8efe76fd78e15d75b2f64aa
                                                • Instruction Fuzzy Hash: ADD15872A243414BDB18CEA88C817BBF792EFC5314F49862CE995873C9E778D905C782
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: &#
                                                • API String ID: 0-1789715784
                                                • Opcode ID: 0f12d66f6b808d20c475992f0f687e3f453dd6e3f6f88e05d52d4cafb9cead41
                                                • Instruction ID: 2c393349c529c96e196d072a5e241470aafc7f2826d191d09ff17f48ef7b3dd9
                                                • Opcode Fuzzy Hash: 0f12d66f6b808d20c475992f0f687e3f453dd6e3f6f88e05d52d4cafb9cead41
                                                • Instruction Fuzzy Hash: 11A148716243115BDB28EFA8C85277BB3E5EF81324F09956CE9869B284E338D901CB53
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: -
                                                • API String ID: 0-2547889144
                                                • Opcode ID: 27c89adea84a4971459812ff31a4728146f694fcb44008b8af47e8cd9ff8a59b
                                                • Instruction ID: 8af2f5cb0472f52fc68e58c7a3a71a8b605ee720750c22eb87187acd80d70336
                                                • Opcode Fuzzy Hash: 27c89adea84a4971459812ff31a4728146f694fcb44008b8af47e8cd9ff8a59b
                                                • Instruction Fuzzy Hash: CBD12C31A1C3464BC71A8E69C8D02AABBE2EFC5364F18CA1DE5E5073D9D7389945CF81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: de
                                                • API String ID: 0-2106599819
                                                • Opcode ID: 859681f232736f0ad411de2e9c44a8bd8c96edd644b44a10bf2b24b8f8322015
                                                • Instruction ID: a1a4298b8a812f67f713bc847c394f0bdb96b659e7babba759b5b0f14368c589
                                                • Opcode Fuzzy Hash: 859681f232736f0ad411de2e9c44a8bd8c96edd644b44a10bf2b24b8f8322015
                                                • Instruction Fuzzy Hash: B69125719183118AC724DFA4C89276BB3F2EF91364F298A2CE4D64B395FB788505C792
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: ~
                                                • API String ID: 0-1707062198
                                                • Opcode ID: 8c5aa6b5a5b2fe2e388992ca06d89cc462c2ef20750d480a456fbd2899bcd495
                                                • Instruction ID: c84f220a143b88477ae7d7f5526abd54ff2299629e4d19c9f35481c9fa9076b1
                                                • Opcode Fuzzy Hash: 8c5aa6b5a5b2fe2e388992ca06d89cc462c2ef20750d480a456fbd2899bcd495
                                                • Instruction Fuzzy Hash: 88A13872A142615FCB25CE68888076AB7D1AFD5324F1AC33DEDA98B3D5D7308806D7C1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: PT
                                                • API String ID: 0-4135314810
                                                • Opcode ID: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                • Instruction ID: 25ccb863cc77ec1ff61037279dabbcd57e572556d3b19ace43a1a08591371230
                                                • Opcode Fuzzy Hash: 2838c07cfca04fbe2cabb14719c9c0661598261e54099377b9e0bd013184ce3a
                                                • Instruction Fuzzy Hash: 5AA1EFB4118B818FD726CF79C9A0A62BFE1AF47340B19869CD4D24FB66D339E406CB11
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: cdef
                                                • API String ID: 0-4216504194
                                                • Opcode ID: 6cfb0631b4c3af94e0a4d7ca533938db559d7b6d0bfe02f92feebc81ba876585
                                                • Instruction ID: e6aa29500fff77e838862ea88d049c8a67e5a7f91456a5a3e7600aab44383deb
                                                • Opcode Fuzzy Hash: 6cfb0631b4c3af94e0a4d7ca533938db559d7b6d0bfe02f92feebc81ba876585
                                                • Instruction Fuzzy Hash: 5F818871A183428FCB24CF64C980A7FB7E1EFD6314F59893CD99657699C731A801D782
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: gfff
                                                • API String ID: 0-1553575800
                                                • Opcode ID: c5d9ff75fed77c201b8d14b3cc3b758706ca82fef0a51ed8aa8899dc59fb4eb5
                                                • Instruction ID: b799af4828408dd5ee25a1a2c85574b70f097246d1ef9d0eeea4a3851b8ddd03
                                                • Opcode Fuzzy Hash: c5d9ff75fed77c201b8d14b3cc3b758706ca82fef0a51ed8aa8899dc59fb4eb5
                                                • Instruction Fuzzy Hash: 909113716217428FE719CB78CC507A6B7D2FF85314F18C67DC09A8B7A6EA38A442C741
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: c$
                                                • API String ID: 0-2516980088
                                                • Opcode ID: bc3c15472f07d559a5396f8094059b7ab067923e86a285eaa48d66e2478d2574
                                                • Instruction ID: e256baca13670e6616af6735235502f556be2fd09a17aaedc9076231c2f3f88a
                                                • Opcode Fuzzy Hash: bc3c15472f07d559a5396f8094059b7ab067923e86a285eaa48d66e2478d2574
                                                • Instruction Fuzzy Hash: 079198B0110741CFD724CF25C4A5762BBB2FF46314F29968CC4864F7A9E3B9A886CB95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: Fg
                                                • API String ID: 0-875302535
                                                • Opcode ID: 42a71ed4ddc16415858e4dfc4422956aad04ddc95995e0a2601de5add053e1e2
                                                • Instruction ID: 68f7a9d58e245b1708923989e55bc7f9417db21b17645f464ca7f27dbe52b87d
                                                • Opcode Fuzzy Hash: 42a71ed4ddc16415858e4dfc4422956aad04ddc95995e0a2601de5add053e1e2
                                                • Instruction Fuzzy Hash: 0281E87121D3808BD769CF35C8617EBBBD3EBD2204F28996DD1C987296DB38400ACB16
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: js{g
                                                • API String ID: 0-1014319796
                                                • Opcode ID: 2bedd816319602fe80fa94cf924704a6c11e2863fdffa8fa3602250936590e55
                                                • Instruction ID: 9e36502d6f6de0471c2c9160fe6eb0a16b90ac2fb305e4c2662278b956fb52a5
                                                • Opcode Fuzzy Hash: 2bedd816319602fe80fa94cf924704a6c11e2863fdffa8fa3602250936590e55
                                                • Instruction Fuzzy Hash: 0A814671654B804BE7398F35C8517ABBBE3AB52618F188A5CD1D39BF99C778A406CB00
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: ihgf
                                                • API String ID: 0-2948842496
                                                • Opcode ID: eef0a356b23e55d2308e20bed1a6a7dcd73da6f3f0547914f9e2b30739e3ef6c
                                                • Instruction ID: 7bae7c8ab5a7c2b36b79be51e0f511af9ec3236d7e2b3b1a622a0ec9c9431e91
                                                • Opcode Fuzzy Hash: eef0a356b23e55d2308e20bed1a6a7dcd73da6f3f0547914f9e2b30739e3ef6c
                                                • Instruction Fuzzy Hash: 8B81F7346143019FDB24DF68C980A2BB7E2FFD5324F59952CE586873A9DB31D801DB42
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: gfff
                                                • API String ID: 0-1553575800
                                                • Opcode ID: de86720abe9662384bfc4389f4b275199587a53d7c35c6b33b3c21993df62823
                                                • Instruction ID: 87e12d738c3b9c9ed3b527e5d4c220f36f7abf2e3969db3bcf8fea2d52f21c6a
                                                • Opcode Fuzzy Hash: de86720abe9662384bfc4389f4b275199587a53d7c35c6b33b3c21993df62823
                                                • Instruction Fuzzy Hash: 2171F3716217424FD319CB79CC507A6B7D2AF96304F1CC67DC096CB7AAEA78A442CB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: "
                                                • API String ID: 0-123907689
                                                • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                • Instruction ID: 0ce8324d95eda64a7dbed77cc8557af451c02fac2833a16e2e5716de84ba4ef4
                                                • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                • Instruction Fuzzy Hash: 71710832A283268FD714CEACC89031EB7E2ABC5714F19852EF494873A9D775DD45CB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: Y*>
                                                • API String ID: 0-3862480330
                                                • Opcode ID: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                • Instruction ID: bfeac14e71df04633e6eb2250d398bb1ebcd6ec72809ff86c5b8ac4f970293b9
                                                • Opcode Fuzzy Hash: 22b3804befe7f91e84aca949ffb80fce2ed22dd13d93b44656185de14de2ea60
                                                • Instruction Fuzzy Hash: DF513833B799824BE72C897C4D223A6AA834BD6234B3DD77FD4B1C77E8D5A948058340
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: m
                                                • API String ID: 0-3775001192
                                                • Opcode ID: 41b4e45d489525032a7ff55d2696e510600e92b2c3d7551ddfae36ad8bd27945
                                                • Instruction ID: d5380f4e75302010ad227928633970f463e6b80d8192b3762df5571a145d2371
                                                • Opcode Fuzzy Hash: 41b4e45d489525032a7ff55d2696e510600e92b2c3d7551ddfae36ad8bd27945
                                                • Instruction Fuzzy Hash: DF5124B19183918FD720DFA484903AFBBE2AFC2304F55892CF5E54B245DB38D949CB52
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: w
                                                • API String ID: 0-2991200456
                                                • Opcode ID: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                • Instruction ID: e843f7ab54aba6c145f71580f0aff696955e083d82b7a6e450eb3b6b0b96e53d
                                                • Opcode Fuzzy Hash: 6ffcd2417d58e0d1efea5a9724b595c411f337b55a8ae22910b9b44be8581fce
                                                • Instruction Fuzzy Hash: 334116B6E117618FD704DFA4CC856AFBB72FB84315B0AC1A8C8857B319D77869068BD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: ihgf
                                                • API String ID: 0-2948842496
                                                • Opcode ID: 2b213d4144a63b266ffc054ecdea8f1b716e225e094351901ee27163bfaa7a7b
                                                • Instruction ID: d58546165c7be75431a7e54339ad34e7c72a8d709f7e7686004cf46ff0cc109b
                                                • Opcode Fuzzy Hash: 2b213d4144a63b266ffc054ecdea8f1b716e225e094351901ee27163bfaa7a7b
                                                • Instruction Fuzzy Hash: C0316C347243026FEF708BA49C81B3BB7E5EB96724F55192CE18697294D321E810E616
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID: ihgf
                                                • API String ID: 0-2948842496
                                                • Opcode ID: ae411421d2ccc92dd1a2e9f178d6aa2591b1cae486c28fda228ff2e2e7e3843c
                                                • Instruction ID: 6634cabac23ef57d20fc674cce5df3fee4156768a4b01be59ce8ff36ae7c6fc4
                                                • Opcode Fuzzy Hash: ae411421d2ccc92dd1a2e9f178d6aa2591b1cae486c28fda228ff2e2e7e3843c
                                                • Instruction Fuzzy Hash: DD312934314302AFDB109B94DC81B3BB7E5FB86724F59452CE58697394D324E810D616
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                • Instruction ID: 1f7fad9925ce75586125b3b2ca5a94ea5cebf72bc6abf60e84e8d375a5ff36f1
                                                • Opcode Fuzzy Hash: 2cf22539860d374f1b5b70c1f2b7734314ec6e2843ab381a6f5f63b3db803864
                                                • Instruction Fuzzy Hash: 4352E0315183468FCB16CF58C0D06EABBE1FF88348F588A6DE8995B356D774E849CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 053ef949f8069824f8f231dbd91ce926a4ef04c181cbfe28cc923f465daa30e9
                                                • Instruction ID: 4259dc112e72f50e5e7f1e7a9a1e3f31c7e10277bf5d564be9e8c0ea451560e3
                                                • Opcode Fuzzy Hash: 053ef949f8069824f8f231dbd91ce926a4ef04c181cbfe28cc923f465daa30e9
                                                • Instruction Fuzzy Hash: 1E52D4B0918B858FE736CB74C4843E7BBE5AF41354F145C2EC5EA06A8AD379A485CB02
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                • Instruction ID: c52e7c2ebb0cd4bc6d02a94e6086b5a22902ffb92f24ff0cc41495e6f80c7511
                                                • Opcode Fuzzy Hash: 384453c34c44fa10a221719aff1fe9f2af50c5f2060accd689493d508a0f7137
                                                • Instruction Fuzzy Hash: 92626BB0618B808ED325CF3C8855797BFE5AB5A314F088A5DE0EE873D2C7B56405CB66
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8cebd1d130e129d362c74be989a8f6be5d35db3090ca8dbd55502fd1ced91e81
                                                • Instruction ID: e978eed7f077b387674a1d7bb26f2dbc394893918e645cb06e0bfeabaf1c79b0
                                                • Opcode Fuzzy Hash: 8cebd1d130e129d362c74be989a8f6be5d35db3090ca8dbd55502fd1ced91e81
                                                • Instruction Fuzzy Hash: C53246B0520B118FC33ACF69C5805AAB7F2BF45750B944A2ED6A78BE94D376F495CB00
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                • Instruction ID: dff6e392ff73b1915738218ddb720e6760fbe6fb6ca2fffde92adf40fea72379
                                                • Opcode Fuzzy Hash: d94ed56ffcdc38c94b90bd9783928bf4a55e001c4d3c4371622baab0c0238d3b
                                                • Instruction Fuzzy Hash: 8102F732A287518BC725DF58D8847EBB3E2EFC4345F19893DCA8687299D734A485CF42
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 468bbd116e6e4160b7ead10548a23f5fa0b5aab5ed52178c23e73c87574eccfb
                                                • Instruction ID: 3eee1bc1216a344f1479d9ec015e79f688c77eb7b6151e9752c12e5e0d281b1c
                                                • Opcode Fuzzy Hash: 468bbd116e6e4160b7ead10548a23f5fa0b5aab5ed52178c23e73c87574eccfb
                                                • Instruction Fuzzy Hash: 43128B729113248FC729CFB4EC9665E7FA1FFA6304F41822AC506AB166C734154BEF85
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f25aa825a39bec38ad6b6d36dd1a7b58a115f37f7b46c95bc86c5f4f7415b87
                                                • Instruction ID: 4c2ce9a9dc8033609f8a6f97fbcda16af631eb7eee6a5131447f654887707839
                                                • Opcode Fuzzy Hash: 3f25aa825a39bec38ad6b6d36dd1a7b58a115f37f7b46c95bc86c5f4f7415b87
                                                • Instruction Fuzzy Hash: E5D18331718B498BDB68EF68D8896AEF7E5FB58305F00422EE95AC7244DF30E5118B81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
                                                • Instruction ID: bb497b751c2a5b5030348f67d97ebe443b67fa0de0017b09659d6162f42d2edb
                                                • Opcode Fuzzy Hash: 3e74d2aa687a79bc353c1e30e2761018af6d861ea5a8c8f1c92844b65f1d9ba9
                                                • Instruction Fuzzy Hash: B2D14031518A4C8FDB59EF28C8896EAB7E1FF98300F14466EE94AC7255DF30E545CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9f32036254703c86e30e41b79e12de7cc7207ac734af8b7503e36ad0a5622709
                                                • Instruction ID: 4a156c7011f1ef7ae4d88dbf344b3e58d3c789a0d6c15c64cd443c8e9013e7bc
                                                • Opcode Fuzzy Hash: 9f32036254703c86e30e41b79e12de7cc7207ac734af8b7503e36ad0a5622709
                                                • Instruction Fuzzy Hash: 18E178321087419FC721CF69C880AABFBE5EF98344F44882DE5D987751E375E948CB92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e45004cfa00b96cc07e21d80348e0ecc464919f4c4bc6f170ace2c42d415ba2b
                                                • Instruction ID: b454ca6f7d14cdd73e4d0ff94d55d7795ddec5d3ec1494a12d2a9b3c5a8d7cec
                                                • Opcode Fuzzy Hash: e45004cfa00b96cc07e21d80348e0ecc464919f4c4bc6f170ace2c42d415ba2b
                                                • Instruction Fuzzy Hash: A2B19730324E0E4BCB99DA68D8D4BBAF3D2FB98304F54027AD54AC7159DF24E556CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0a6ff38b7f88a38b39f0feb0216d1201f336bfe1d4496b7dedc26c113c3b1706
                                                • Instruction ID: 87095177db262e7674576db21d35afa2eab35802ce204436de06d01862b05d08
                                                • Opcode Fuzzy Hash: 0a6ff38b7f88a38b39f0feb0216d1201f336bfe1d4496b7dedc26c113c3b1706
                                                • Instruction Fuzzy Hash: A0A138B1211741CFD72ACF78C461A6677E2FF86314729869CD5E68F3A9DB389801CB50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d8522f48c061d96a90bcbb954765979172c44a155916e8e09891f3aefe40ca7a
                                                • Instruction ID: 70bdd6f3a5766f9ca369a7783936ba185841ecb8e9804ad554fda74c01383573
                                                • Opcode Fuzzy Hash: d8522f48c061d96a90bcbb954765979172c44a155916e8e09891f3aefe40ca7a
                                                • Instruction Fuzzy Hash: 28C122B16183808BD718CF65C8507AFBBE6EFD2304F14882DE5D68B295DB38C50ACB56
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7d343a94ccc60b0ac76136acfacaf03ec9124c15c7c37e786dc5ab8e490f6e03
                                                • Instruction ID: 96311a85fa8df38107364b17f6918b9022ec824ce838c54df356045fa12f4889
                                                • Opcode Fuzzy Hash: 7d343a94ccc60b0ac76136acfacaf03ec9124c15c7c37e786dc5ab8e490f6e03
                                                • Instruction Fuzzy Hash: 57B12376914301AFDB21CF64CD41B1ABBE2FFD5318F108A2DF998A72A4D7759804DB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                • Instruction ID: 8f2cbb4bf831822487d7089fa1340b15559d5d4f811a4d34e6c5c8c17cb8dd1d
                                                • Opcode Fuzzy Hash: 34b9a0d7ad4e2640ff3c38ec8b4415170da73e2657f5b2be8b12e8c2df11fb82
                                                • Instruction Fuzzy Hash: 90B17B72E147918FCB05CABCCC4169AFFB25B96220B0DC399D4B6DB3DAC6348802D761
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                • Instruction ID: 93ca35726492a20e548c94dec463774f58dcc3660d6f98c17035b2e1ad8ce085
                                                • Opcode Fuzzy Hash: a1afe4e88f9b97e7e8e8fd3cb907a0d95dd7110aea04d164d9c56f244693baaf
                                                • Instruction Fuzzy Hash: F5C15EB2A587418FC371CF68CC86BABB7E1BF85358F08492DD1D9C6242E778A155CB06
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e2e903f92329977da97ab707699d6460e74b4fcfb6d1b984767a57618237eb95
                                                • Instruction ID: 72ac89853396f797362c8aabb7d592aae27c795e574abbf4a6747b9ef6347cea
                                                • Opcode Fuzzy Hash: e2e903f92329977da97ab707699d6460e74b4fcfb6d1b984767a57618237eb95
                                                • Instruction Fuzzy Hash: BDA13F71608A4C8FDB55EF68C889BEAB7F5FB58315F10466EE44AC7164EB30E644CB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 82812cdeafcd33f0fc968029d79aa7a24ca844b7ad5e98367da50fc895b2220f
                                                • Instruction ID: 8d3973f44cb6e74b07964a3c764beb498be460fa9c1c38ce912b9ff82da5b96c
                                                • Opcode Fuzzy Hash: 82812cdeafcd33f0fc968029d79aa7a24ca844b7ad5e98367da50fc895b2220f
                                                • Instruction Fuzzy Hash: 777104742246429FDB35CF64C9C0A7BB7A2EF96314B75862CD197472AAC731E882CB04
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 908f5c4351c674361b7bf87d10fb2e8a93db02d5169a9e62b5518be8655f3495
                                                • Instruction ID: 5fdf6e8e671be32843ed167bf27528bb9d529b93f7ce92680b706763d52716d6
                                                • Opcode Fuzzy Hash: 908f5c4351c674361b7bf87d10fb2e8a93db02d5169a9e62b5518be8655f3495
                                                • Instruction Fuzzy Hash: 715164766243414BEB18DEA8CC50B3BBB93EBD1310F59853DD58387381DB3498029746
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b458a4b395c5c8ee69f5f2b006b0e563729d6c6f05da1ba1057fcc05e7f9fb9b
                                                • Instruction ID: be27a3bb329e8d1286ff729d8f1ef1b16bd0e7a38f4be2651d047b2dbdff0e0e
                                                • Opcode Fuzzy Hash: b458a4b395c5c8ee69f5f2b006b0e563729d6c6f05da1ba1057fcc05e7f9fb9b
                                                • Instruction Fuzzy Hash: 5D8125356183129FCB248F58C98066FB7E2EFC9314F55852CE9868B769D731EC41DB82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                • Instruction ID: 77d38a24a3119d50abdae5097a6bee48dd402a6209301e97a0709d94ae514f18
                                                • Opcode Fuzzy Hash: 878cf165e9656de38300a8645f53e9724a1b6a64a083f1f7d23b351aa812f187
                                                • Instruction Fuzzy Hash: D5712833B6A9914BE328897C4D213AA7A830BD6234F3DC77FE5F5877E9D56588098340
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d2f966890577f15959edc4de71345d5fecb794fae90f6da87e8e32d5ae83de50
                                                • Instruction ID: da2a95b6a2ff692269b64adc56b5b4f72b7e5aee849af284b679de5b32885e73
                                                • Opcode Fuzzy Hash: d2f966890577f15959edc4de71345d5fecb794fae90f6da87e8e32d5ae83de50
                                                • Instruction Fuzzy Hash: 40611A37B243115BDB14CAA9CC8067BB793BBC9724F49823DE996872E4DB7498019782
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                • Instruction ID: 512fa0ec2f581317cdbf02f86c4d2009956de66af69107d23f5344b0bdd1356b
                                                • Opcode Fuzzy Hash: 3c0d2c5577102dd58fbede460a656b1f00c5f7fe775d6732456b41350824bdc2
                                                • Instruction Fuzzy Hash: 87717937A69AD14BD728897C4C603AA7A834FD2230F5DC37DE9F25B3E9C5E609069341
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 64b1c9c5f56f139aa65c1abfed3263135776d97135dd74b25c5f35881b33ae15
                                                • Instruction ID: ac9785d5e42180d11b6ca6ea5d7435c46ace70db361289f5e8a54d0b0a901cb2
                                                • Opcode Fuzzy Hash: 64b1c9c5f56f139aa65c1abfed3263135776d97135dd74b25c5f35881b33ae15
                                                • Instruction Fuzzy Hash: 0D516B716143029FDB249F98C881A3FB7E6EFD9720F56943CE68647359EB309811E742
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                • Instruction ID: f98bf73e9dc6b706aa1bf5b4e710c5c43557b00b41d5d818db4687e682595808
                                                • Opcode Fuzzy Hash: 2c0d35eb954a9d187377820dd095db1c7b0c4961e6edb85d2e315a33cbd56d54
                                                • Instruction Fuzzy Hash: A571B071D043699FEB25CFA9CD817DDBBB2FB80310F18816DD459AB289DB7409468F80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a16964f98263bb64d29cf427ecac629650e46b659aa8a65445bff108377c5da2
                                                • Instruction ID: 56379b4c71afdb6cc53d2ab27f4faa36e7d4ef1cdd382406f9ed08b9aabf16ab
                                                • Opcode Fuzzy Hash: a16964f98263bb64d29cf427ecac629650e46b659aa8a65445bff108377c5da2
                                                • Instruction Fuzzy Hash: 89616A359083A14FC726CF78C850A2E7BE1AF96314F4881ADECE44B3A6D775D905CB92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 397dd7719a72b64fe6fd9bff4a2b0e0990fccc0e48aff55cf7b07deb802e575f
                                                • Instruction ID: 78ef12b78443fbf83054f593206b56a54ad669b8964d69e977e49ce3f3c71a20
                                                • Opcode Fuzzy Hash: 397dd7719a72b64fe6fd9bff4a2b0e0990fccc0e48aff55cf7b07deb802e575f
                                                • Instruction Fuzzy Hash: 2F517C71E242478BEB28CFA8D4A12FAFBE6EF55350B18866DC5974B3C9D7389540C780
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                • Instruction ID: 8554139e8e5269d692dbb1df24e9bda106b21f0639edeb545a1bba3660ec5f44
                                                • Opcode Fuzzy Hash: 9a456be5166b92ab10874784492d9a7357f7a85283333ec6aeb1257d6c9849aa
                                                • Instruction Fuzzy Hash: EE516AB15083448FE714DF69D49435BBBE1BB84314F444A2DE5EA87390E379D6088B82
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 896f3fb295f70a3d1d2d868c2c2a0e71ef34daf535ef3f76e5866041dfd6add5
                                                • Instruction ID: 2773a44cd50427bed2026675b4df2760b0d86ddbb0bad701c40211a92b65fa2a
                                                • Opcode Fuzzy Hash: 896f3fb295f70a3d1d2d868c2c2a0e71ef34daf535ef3f76e5866041dfd6add5
                                                • Instruction Fuzzy Hash: 996189B16003028FE769CF65D881256FBA1FF46300F1996ACC09A8F752E338E481CB86
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                • Instruction ID: b0a3f36b4f419d06653560a73e093a453584cb49e9747218196b5740bdb97862
                                                • Opcode Fuzzy Hash: c7e211e6c2eb9e6b08159abb43e9af5e1aa1d9e93aa804f146ff2ed9fa703b0b
                                                • Instruction Fuzzy Hash: D4516833A795908BE7288D7C5C613A67A870BD6230F6CC7BEE8B3C73E5C1598804A340
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                • Instruction ID: c10e60d39fcc94fb7873e3a35dcc7c76844aeab0e68723a57687a4a8ffdc7dba
                                                • Opcode Fuzzy Hash: 20d0a7076ca4a073ae36702b2f035087ecf70489209c947b4e4cdcb3c897cb6e
                                                • Instruction Fuzzy Hash: 045192777569004BC71CC97C8DA5266A6D3ABD822072E863DD577C77D8EAB8E8028640
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                • Instruction ID: 4c31f5adf3776119ad1421266b7b4b71aeebc034a4ccf6056177add17155f4af
                                                • Opcode Fuzzy Hash: 80662d8b24bff6f8992e634c1a49b92d2c70a6d1023e3f7c4dc80169a6ede74d
                                                • Instruction Fuzzy Hash: AB416B76E687144FC728EFE4D8C027AB3A2ABD7314F1E953D89D31B358DA704D019689
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                • Instruction ID: acd0a10322f223369592bc1da8a9f0cbe9da1357f2df8f97192cacaa4d10460a
                                                • Opcode Fuzzy Hash: a2cbd620310961616688d7e42db6707dedebd0210a3dd93db7e64ebc8315cc7a
                                                • Instruction Fuzzy Hash: B141C5A011C3D28BDB35CF3980607B7BFD1AF93259F2859ADC2C5A7246D7754006C759
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 58723dc140c456be560c71b36cd596879ae42af8ad7e401e55e8502de25fd2db
                                                • Instruction ID: 0da7ed140512dc73218a68635802340cd300eb548b8c3b137a78e569c3f9923a
                                                • Opcode Fuzzy Hash: 58723dc140c456be560c71b36cd596879ae42af8ad7e401e55e8502de25fd2db
                                                • Instruction Fuzzy Hash: 9E418E77F543090BD71CAEF48C993AAF2969BC4314F09803E5E86AB394DE784C0596C1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                • Instruction ID: d577967cee77533b28dc540c2050088b720d0dbc980226b7e8f8f6a23761d657
                                                • Opcode Fuzzy Hash: 464c79d7ef81001f4e361af6555152b884662c27da4a39cdc900ccd1ec23a395
                                                • Instruction Fuzzy Hash: 7D51467951C3418BD324CF24D840AABB7F2EFC6304F59995CF8969B2A5EB309906C746
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: afec766a8f46cebfa70309c7c12ba714155290e18f5d997497038f4e7e1a0749
                                                • Instruction ID: 16ab3c1b08f18dbb782d6308a5c2e5c283108dc923e5926d8b6e275e5239d4f7
                                                • Opcode Fuzzy Hash: afec766a8f46cebfa70309c7c12ba714155290e18f5d997497038f4e7e1a0749
                                                • Instruction Fuzzy Hash: 53414871A203428BD7248F79C891776B3E6EF96310F28436DD6E6CB7A9E7789441CB10
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0aff5b575bdc1cbf128a6fcaf21673d610ba054c2e19d9dceb1adbeeb882f19a
                                                • Instruction ID: a1479c8597d66a6992aaf2f0e312be8d8c09511a0c2aa201e11bf1cbecf243f3
                                                • Opcode Fuzzy Hash: 0aff5b575bdc1cbf128a6fcaf21673d610ba054c2e19d9dceb1adbeeb882f19a
                                                • Instruction Fuzzy Hash: 7241367521C3829FD7158B64CC967F777E0EF46304F18946CE486CB292E7294503CB1A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                • Instruction ID: 8d190f02cec81998aeddb1d0c836fd766d87d5e41028f299de7ed84ebb5b00f9
                                                • Opcode Fuzzy Hash: 305eeb4800ffca951eb0843350452d0362ef6350398f3d1306d62d3ed5eba46d
                                                • Instruction Fuzzy Hash: F341A2A011C3D28BDB358F3490607BBBFD0AF93218F24599DD2D6A7286D7354007CB5A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b3442938981b70338c85b6fdcef42b4b1049c4e4fc606aed39a4a87bba456e78
                                                • Instruction ID: ef0f92399054a6304a75a0beaefef018466333d351d73b9248d8339c1b59c84e
                                                • Opcode Fuzzy Hash: b3442938981b70338c85b6fdcef42b4b1049c4e4fc606aed39a4a87bba456e78
                                                • Instruction Fuzzy Hash: 1641BBB29787144FCB28EFE4ECC067AB3A1AB86320F5E552DD9E31B364D7608C00D248
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                • Instruction ID: 734619da0cbe806716e0d9cd719ea6f1dca2a57dedcef2d55161a3cd94577cb5
                                                • Opcode Fuzzy Hash: 3aeefbf0a4d65d0b572efcb3e51add84d891666070d970ea2441e25f135985dc
                                                • Instruction Fuzzy Hash: EB317776A687548FC728EFE4E8C017AB3A1AB8B310F5E552D89E30B364D7708D00D649
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a7540190068c50c970c78dd1fb816c39bd2abd836d4de7d463699aecd841a6eb
                                                • Instruction ID: d6a4c01e7073a75318fade66ae84807ecef781cc2d5b0ce32a6a87b24abf5458
                                                • Opcode Fuzzy Hash: a7540190068c50c970c78dd1fb816c39bd2abd836d4de7d463699aecd841a6eb
                                                • Instruction Fuzzy Hash: 2C4190B26187908BC734CF64C85179FBAF2EBD1214F498E2CD4DAAB345E73585098B87
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                • Instruction ID: b1c4ebbb58dd3683dee5b49e8945c237f40d14941401e39f23040cffe61c69cd
                                                • Opcode Fuzzy Hash: 184c9a32383a48190f2719d2aadad879d32520f34a2a0851a9020504aa8db94d
                                                • Instruction Fuzzy Hash: C8317FA011C3D28ADB35CF2490607BBBBE0AF93259F1499ADC2D5A7287D7384046CB5A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e0dc337c31b60e59c40b3c4b66153a54b5a75c190226419d79e85c67cff8ed99
                                                • Instruction ID: b596e8909d8c519a01a02989e49e5b38f4f0103f105664557417451e522200cd
                                                • Opcode Fuzzy Hash: e0dc337c31b60e59c40b3c4b66153a54b5a75c190226419d79e85c67cff8ed99
                                                • Instruction Fuzzy Hash: 3231097012C3C28BD7B48B2848A07BBBBD6DF83205F68592CD5CA9B196DB254046CB17
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 546c49f651c2ee0ec7203154adbd460b810419c4e5ed9a3c8b647bf01d903c3f
                                                • Instruction ID: 164a91b9f1d26d303f9027627dcb3355a9c180344843ea33012f354c0ff28c81
                                                • Opcode Fuzzy Hash: 546c49f651c2ee0ec7203154adbd460b810419c4e5ed9a3c8b647bf01d903c3f
                                                • Instruction Fuzzy Hash: 133154716293458BC764DFA48C90A7AB353EBD6308F5D893CD9858B345D379C8028746
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                                                • Instruction ID: 9b7866fb4f8ac91b769f241145bff181ac27143e0fded9b311be25435e9335fc
                                                • Opcode Fuzzy Hash: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                                                • Instruction Fuzzy Hash: D6516F74E10209DFCB09CF88C590AAEB7B2FF88354F248199D815AB345D371AA91CBA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9879a937105e083bd9aef7d9b8e876d5a873d896f238b78d14b88aad6da131cd
                                                • Instruction ID: d11c5c12511ab2cd6a14e62afb356473f3a940f6290a7e668bc128a25fb7b663
                                                • Opcode Fuzzy Hash: 9879a937105e083bd9aef7d9b8e876d5a873d896f238b78d14b88aad6da131cd
                                                • Instruction Fuzzy Hash: 9A31E538A246429AE7669B59CD80B767793FF86384F58D12DF082876ACDB34A812C714
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                • Instruction ID: b9c0f6aae485b39eb8287f76d282ee34ff9788f0f41762ed7166166d741771bf
                                                • Opcode Fuzzy Hash: 9112804f8139e9297ba88e3742caefcf6529a162b57808c6ac39dfffa7ef667e
                                                • Instruction Fuzzy Hash: 69210B21B187910BDB18DE3988D1237F7D75BCB124F48D63DC4A7972D9CA34E5058644
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fbddf629d58ab5b7ce3c6d341b6087eefabcc06d9ed1031e48f954126914271b
                                                • Instruction ID: 83ac6a66cd45c4af7c48ab9c4b84a833da112b7a12efcebd77d02e784398a299
                                                • Opcode Fuzzy Hash: fbddf629d58ab5b7ce3c6d341b6087eefabcc06d9ed1031e48f954126914271b
                                                • Instruction Fuzzy Hash: 7821C275624B029FD3208F688884B27B7A7AB97220F24866CD5954B699CB34EC42CB54
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                • Instruction ID: 0f0ccdddec2cc35eeae68398f5baf87ac0fa6be8ec9aaea5f7299c55151c0b50
                                                • Opcode Fuzzy Hash: d6c3b5f98540c4edbfb2bfe1cd8306b70007439d23ccf1357e9be793c2fe8105
                                                • Instruction Fuzzy Hash: DF115773F3653207B351AE769CE829623A3EFC2358B1A0134E941C7686CB31FA12E164
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c3217eddf26d73e13bed4335cf48e091058d425e1d7b0796f7844dc1e666736a
                                                • Instruction ID: b77cd62554a6ce682687ce16d8fd9a1d008bca40f8df889daa302cc0b3c1e550
                                                • Opcode Fuzzy Hash: c3217eddf26d73e13bed4335cf48e091058d425e1d7b0796f7844dc1e666736a
                                                • Instruction Fuzzy Hash: 0B11E771664300AFCB18CFE8D8D1A7EB7A5AB87305F49953DD582C7369C674C9018B46
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                • Instruction ID: 4b1c6f2d87ed246c11aaac37a2ba167bc4f6c5a8143586559aa4ed7fee4806e4
                                                • Opcode Fuzzy Hash: 44c97935eddf75c305e2d2b65cd8ba00c8eb118628fa0640b3156059a25bc93e
                                                • Instruction Fuzzy Hash: 45114875A687458FC728FFE4ECC027AB7A5AB8B310F19843D89A647365EB608D10C649
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                                                • Instruction ID: 2a6552a19a94f7653b4e95c49697fcd5e8b779d670d84328118365e34230d441
                                                • Opcode Fuzzy Hash: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                                                • Instruction Fuzzy Hash: 0831A174E00219DFCF08CF98C5A0AAEBBB1FF48314F248599D815AB345D371AA92CF90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f5c82fc671e06e79b78df2e2b48bef573e4aa83533a2b75342557a0be53bb444
                                                • Instruction ID: 816a2d3ea1a061084e0ebd1b591b2d57a912bdd08c44ba01c196c7cb23faba0e
                                                • Opcode Fuzzy Hash: f5c82fc671e06e79b78df2e2b48bef573e4aa83533a2b75342557a0be53bb444
                                                • Instruction Fuzzy Hash: 98012B70B156015AF71847698C41B3A7363FBC3711F75932DE1819B3E6DE7188018B05
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                • Instruction ID: 0357a181190f5b5737cbf4e00a9227af3df77f888f97d6755a5942c920ceb2ac
                                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                • Instruction Fuzzy Hash: 3411C633A251D14DC7168D7C8810565BFA30A93238FD98399F4B59F2E6C6628A8A9360
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: babb52ce3867e81688af6e2cbfc925ee92a6f3f8cd139ab93b6cbf9c46b7bedb
                                                • Instruction ID: ee4b50a5930f4235cc3f359b276d3a30aa7f0723f1ffa60fbf67bb139bad2ae3
                                                • Opcode Fuzzy Hash: babb52ce3867e81688af6e2cbfc925ee92a6f3f8cd139ab93b6cbf9c46b7bedb
                                                • Instruction Fuzzy Hash: E50184F161030347EB21DED584E0B3FB3E9AF95B1CF19442CDA1457248DB76E845CAA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 08b4345849cd0f47e80d1ed5c22eab79d945ad8a979d27bd12cd0f1252f48fec
                                                • Instruction ID: 3ea7d10ea44c39fa8c8fac6378227ef9303d3a3f0a59f19d4bf1ecc959cbcb6f
                                                • Opcode Fuzzy Hash: 08b4345849cd0f47e80d1ed5c22eab79d945ad8a979d27bd12cd0f1252f48fec
                                                • Instruction Fuzzy Hash: A21104767647009FDB18CFA8D8D06BAB3E19B8A311F4A953C9582C3394CBB8C9068746
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 358e2d3b4c42a0c731e3efba7596486553403020c12b89a5f8a1758b9ddfefcd
                                                • Instruction ID: 8657663bf3dc0a573fa1af6a4f5cf51f8d77c8f3382bfd1eb17317bd8e3ccea7
                                                • Opcode Fuzzy Hash: 358e2d3b4c42a0c731e3efba7596486553403020c12b89a5f8a1758b9ddfefcd
                                                • Instruction Fuzzy Hash: F9116B755143025BDB209F94DDC0B3BB7E7A7E6740F569039E6C1972A9CB30C842A753
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                • Instruction ID: 9ab933bd559f46b3a3c1cde878c5656ccdaec9c443026cb3e1263f9b804dfa70
                                                • Opcode Fuzzy Hash: 009d4c94d368716b5c6a07810fd56c9ecea920436c5469bb2fcdecc493a6d2d4
                                                • Instruction Fuzzy Hash: 221127B07507804FD715CF64CCC1AA57772AB86314715867CA8418BB96C67CA805CB64
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                • Instruction ID: 2ef85bffcb5fe3e9838de7a9405d4966b4e1e1e4c54097a233c2d7711f14faf4
                                                • Opcode Fuzzy Hash: 9189c4c3175398eb84fc80681e1c6dfaa05d9782f835bdc2878a97ad02b88055
                                                • Instruction Fuzzy Hash: CA11CE71608342ABD7248F299D906BBBBE2EBC6358F14AA2CE58243794C630C441CB0A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 19ed9741b84afb298707877cb2535680f06aa68bf492e7e97af849109ca09354
                                                • Instruction ID: 8651047d7c8e8c13e243c8393560793c2fb5186140bac1c38753960b10a89c39
                                                • Opcode Fuzzy Hash: 19ed9741b84afb298707877cb2535680f06aa68bf492e7e97af849109ca09354
                                                • Instruction Fuzzy Hash: C0F039B5E083818BC718CF28844066AFBE5AB9A700F10592DD58AA3341DB319545CB4A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                                                • Instruction ID: 8f001eae8476c8060b1c23c2068364efd246191811e3537bb8c43614297868cf
                                                • Opcode Fuzzy Hash: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                                                • Instruction Fuzzy Hash: 47011D34A11148EFCB15DF94C294AACF7B2FF44350F208599D8056B385D731AF91DB40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1c062fd088646d19ef1d8bd4d71c411c976c3123481e9341e85681c4dc346f69
                                                • Instruction ID: b56d3c72ccc4d872960315fef8b59e197d8309e10b2030bc5473290e33b09bc1
                                                • Opcode Fuzzy Hash: 1c062fd088646d19ef1d8bd4d71c411c976c3123481e9341e85681c4dc346f69
                                                • Instruction Fuzzy Hash: 48F046B41193929FC300DF29D29051BFBE0ABD5318FA4AA5CE8D95B216D334C6028B4A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 15be5673a4952075455a6c2d450438e7f22dd3e3a56e71dfeee11c81b82dc352
                                                • Instruction ID: 6193c6d390a8225c3b3a300272ce12ac19d650d288e9be0873a2adc8f31a4704
                                                • Opcode Fuzzy Hash: 15be5673a4952075455a6c2d450438e7f22dd3e3a56e71dfeee11c81b82dc352
                                                • Instruction Fuzzy Hash: 92F0EDB16C8301BAF6249E40CC43F6AB6A49755B00F301518B345790E0E5E1B9498B0E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                • Instruction ID: 55367ec44160930b00c9fc6537dab478ff1644b50a375ce9a2e9be8a2e5deb7c
                                                • Opcode Fuzzy Hash: 130b8f035e0f9caf36d69ffe2fe00e5717c81f35e5d13109d0f780a603360f32
                                                • Instruction Fuzzy Hash: 12F0A735B456808BEB08CF38D82155ABBE2E387224F145A7DD641D3755D739C4018605
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7004a593075d1604d820592827f960a74d411a36b63cc4088cdb0a0f645b001a
                                                • Instruction ID: 35157a91527617221951ac2766be328a81082b9bada299aafc8de39b0efc039d
                                                • Opcode Fuzzy Hash: 7004a593075d1604d820592827f960a74d411a36b63cc4088cdb0a0f645b001a
                                                • Instruction Fuzzy Hash: F5D02E7483C9238A2A290E7410202B0E7220B0350770A89E488C23F04ACF0AC9034198
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e3ed35eba93c559e2b640e4773887084713877586e1a61965fa59bb2e9adbcdb
                                                • Instruction ID: 88d28f4539103711ef6104adbc4c901a24cbbd6804f5379e7088d630b29811a1
                                                • Opcode Fuzzy Hash: e3ed35eba93c559e2b640e4773887084713877586e1a61965fa59bb2e9adbcdb
                                                • Instruction Fuzzy Hash: 5DA00129A9E6548AD2119F4494927F0F778E31770AF1438289904AB153D196E950864C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 39f376952ae625b8b9e581a4d9adace311e733e6b5fc1a80656dd2f6c93a6218
                                                • Instruction ID: 979b3066809f2b39c8d4e254b46c6f556eea9d2a5e27a8b6f776bea0b7d6dcb5
                                                • Opcode Fuzzy Hash: 39f376952ae625b8b9e581a4d9adace311e733e6b5fc1a80656dd2f6c93a6218
                                                • Instruction Fuzzy Hash: 1AB002759486418FC644DF18D584974F7F5AB0B211F1564549589E7222D220D8408A19
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 89a247458966beb6ee1323d7209a08a94252eab5608dc6956c606f04d9c1587d
                                                • Instruction ID: 10c72ce3a0ca8e08a8575cf423c81d1ec4165de9f21f41d416b206e48e332a4b
                                                • Opcode Fuzzy Hash: 89a247458966beb6ee1323d7209a08a94252eab5608dc6956c606f04d9c1587d
                                                • Instruction Fuzzy Hash: FDA00239E5C40197CA08CF20A854871E2BA6B5F204FA134288106B7C52D951D500854C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1843357403.00000000022B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022B0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_22b0000_5RRVBiCpFI.jbxd
                                                Yara matches
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dbeba292ae877db911bd2f22180c16664a0dc2a699d78ed72cdc2ede8be8a5c3
                                                • Instruction ID: 70204a4f19da818e306c590333116dd845209fb171f96af6639338c1a50bb7b2
                                                • Opcode Fuzzy Hash: dbeba292ae877db911bd2f22180c16664a0dc2a699d78ed72cdc2ede8be8a5c3
                                                • Instruction Fuzzy Hash: 38B00254855145D6D704CF10D905575F270BF43705F10F655A40437160D3B4C248870E